|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
OR_ocn770008388 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
120103s2005 caua o 001 0 eng d |
040 |
|
|
|a N$T
|b eng
|e pn
|c N$T
|d YSM
|d VLB
|d CUSER
|d VMI
|d EBLCP
|d TEFOD
|d OCLCQ
|d OCLCF
|d DEBSZ
|d OCLCQ
|d IDEBK
|d OCLCO
|d YDXCP
|d E7B
|d FMG
|d AUM
|d OCLCO
|d NLE
|d TEFOD
|d OCLCQ
|d OCLCO
|d OCLCQ
|d FEM
|d OCLCQ
|d OCLCA
|d UIU
|d VT2
|d MOQ
|d OCLCQ
|d C6I
|d HS0
|d UKAHL
|d OCLCQ
|d OCLCO
|d OCLCQ
|
019 |
|
|
|a 70277080
|a 326626734
|a 759520541
|a 856987222
|a 859883053
|a 861530077
|a 968014286
|a 969024167
|a 1019733171
|
020 |
|
|
|a 9780596153465
|q (electronic bk.)
|
020 |
|
|
|a 0596153465
|q (electronic bk.)
|
020 |
|
|
|a 9780596553944
|q (electronic bk.)
|
020 |
|
|
|a 0596553943
|q (electronic bk.)
|
020 |
|
|
|z 0596008783
|
020 |
|
|
|z 9780596008789
|
024 |
8 |
|
|a 0596008783
|
029 |
1 |
|
|a DEBSZ
|b 396385265
|
035 |
|
|
|a (OCoLC)770008388
|z (OCoLC)70277080
|z (OCoLC)326626734
|z (OCoLC)759520541
|z (OCoLC)856987222
|z (OCoLC)859883053
|z (OCoLC)861530077
|z (OCoLC)968014286
|z (OCoLC)969024167
|z (OCoLC)1019733171
|
037 |
|
|
|a 494853D1-42EF-465D-93D5-DABE4C2513EB
|b OverDrive, Inc.
|n http://www.overdrive.com
|
050 |
|
4 |
|a TK5105.59
|b .W56 2005eb
|
072 |
|
7 |
|a COM
|x 060040
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 22
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Windley, Phillip J.,
|d 1958-
|
245 |
1 |
0 |
|a Digital identity /
|c Phillip J. Windley.
|
246 |
1 |
4 |
|a Unmasking Identity Management Architecture (IMA)
|
260 |
|
|
|a Sebastopol, CA :
|b O'Reilly,
|c ©2005.
|
300 |
|
|
|a 1 online resource (xviii, 234) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|
500 |
|
|
|a Includes index.
|
520 |
|
|
|a "The rise of network-based, automated services in the past decade has definitely changed the way businesses operate, but not always for the better. Offering services, conducting transactions and moving data on the Web opens new opportunities, but many CTOs and CIOs are more concerned with the risks. Like the rulers of medieval cities, they've adopted a siege mentality, building walls to keep the bad guys out. It makes for a secure perimeter, but hampers the flow of commerce."--Back cover
|
588 |
0 |
|
|a Print version record.
|
542 |
|
|
|f Copyright © O'Reilly Media, Inc.
|g 2005.
|
505 |
0 |
|
|a Digital Identity; Preface; Conventions Used in This Book; Comments and Questions; Safari Enabled; Acknowledgments; 1. Introduction; 1.2. Digital Identity Matters; 1.3. Using Digital Identity; 1.4. The Business Context of Identity; 1.5. Foundational Technologies for Digital Identity; 1.6. Identity Management Architectures; 2. Defining Digital Identity; 2.2. Identity Scenarios in the Physical World; 2.3. Identity, Security, and Privacy; 2.4. Digital Identity Perspectives; 2.5. Identity Powershifts; 2.6. Conclusion; 3. Trust; 3.2. Trust and Evidence; 3.3. Trust and Risk
|
505 |
8 |
|
|a 3.4. Reputation and Trust Communities3.5. Conclusion; 4. Privacy and Identity; 4.2. Privacy Pragmatism; 4.3. Privacy Drivers; 4.4. Privacy Audits; 4.5. Privacy Policy Capitalism; 4.6. Anonymity and Pseudonymity; 4.7. Privacy Principles; 4.8. Prerequisites; 4.9. Conclusion; 5. The Digital Identity Lifecycle; 5.2. Propagating; 5.3. Using; 5.4. Maintaining; 5.5. Deprovisioning; 5.6. Conclusion; 6. Integrity, Non-Repudiation, and Confidentiality; 6.2. Non-Repudiation; 6.3. Confidentiality; 6.3.1.2. Public key cryptography; 6.3.1.3. Hybrid key systems; 6.3.1.4. Public key cryptosystem algorithms
|
505 |
8 |
|
|a 6.3.2. Message Digests and Hashes6.3.3. Digital Signatures; 6.3.4. Digital Certificates; 6.3.5. Certificate Authorities; 6.3.6. Certificate Revocations Lists; 6.3.7. Public-Key Infrastructures; 6.3.8. Going Further; 6.4. Conclusion; 7. Authentication; 7.2. Authentication Systems; 7.2.2. ID and Password; 7.2.2.2. Password reset; 7.2.3. Challenge-Response Systems; 7.2.4. Digital Certificates; 7.2.5. Biometric Devices; 7.2.6. Smart Cards; 7.3. Authentication System Properties; 7.3.2. Appropriate Level of Security; 7.3.3. Locational Transparency; 7.3.4. Protocol Insensitivity
|
505 |
8 |
|
|a 7.3.5. Appropriate Level of Privacy7.3.6. Reliability; 7.3.7. Auditability; 7.3.8. Manageability; 7.3.9. Federation Support; 7.4. Conclusion; 8. Access Control; 8.1.2. Principle of Least Privilege; 8.1.3. Accountability Scales Better than Enforcement; 8.2. Authorization Patterns; 8.2.2. User-Based Permission Systems; 8.2.3. Access-Control Lists; 8.2.4. Role-Based Access Control; 8.3. Abstract Authorization Architectures; 8.4. Digital Certificates and Access Control; 8.5. Conclusion; 9. Names and Directories; 9.2. Naming; 9.2.2. Uniform Resource Indicators: A Universal Namespace
|
505 |
8 |
|
|a 9.2.3. Cool URIs Don & t Change9.3. Directories; 9.3.2. An Example Directory; 9.3.3. Enterprise Directory Services; 9.3.3.2. RMIRegistry; 9.3.3.3. X.500: heavyweight directory services; 9.3.3.4. LDAP; 9.4. Aggregating Directory Information; 9.4.2. Virtual Directories; 9.5. Conclusion; 10. Digital Rights Management; 10.2. The DRM Battle; 10.3. Apple iTunes: A Case Study in DRM; 10.4. Features of DRM; 10.5. DRM Reference Architecture; 10.6. Trusted Computing Platforms; 10.7. Specifying Rights; 10.8. Conclusion; 11. Interoperability Standards; 11.2. Integrity and Non-Repudiation: XML Signature
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Data protection.
|
650 |
|
0 |
|a Computer crimes
|x Prevention.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Protection de l'information (Informatique)
|
650 |
|
7 |
|a COMPUTERS
|x Internet
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Networking
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computer crimes
|x Prevention.
|2 fast
|0 (OCoLC)fst00872068
|
650 |
|
7 |
|a Computer networks
|x Security measures.
|2 fast
|0 (OCoLC)fst00872341
|
650 |
|
7 |
|a Data protection.
|2 fast
|0 (OCoLC)fst00887958
|
776 |
0 |
8 |
|i Print version:
|a Windley, Phillip J., 1958-
|t Digital identity.
|d Sebastopol, CA : O'Reilly, ©2005
|z 0596008783
|w (DLC) 2006274918
|w (OCoLC)61266094
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/0596008783/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH29297936
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL540311
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10758238
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 413675
|
938 |
|
|
|a ProQuest MyiLibrary Digital eBook Collection
|b IDEB
|n cis28428820
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 7353830
|
994 |
|
|
|a 92
|b IZTAP
|