Cargando…

Digital identity /

"The rise of network-based, automated services in the past decade has definitely changed the way businesses operate, but not always for the better. Offering services, conducting transactions and moving data on the Web opens new opportunities, but many CTOs and CIOs are more concerned with the r...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Windley, Phillip J., 1958-
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Sebastopol, CA : O'Reilly, ©2005.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 a 4500
001 OR_ocn770008388
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu---unuuu
008 120103s2005 caua o 001 0 eng d
040 |a N$T  |b eng  |e pn  |c N$T  |d YSM  |d VLB  |d CUSER  |d VMI  |d EBLCP  |d TEFOD  |d OCLCQ  |d OCLCF  |d DEBSZ  |d OCLCQ  |d IDEBK  |d OCLCO  |d YDXCP  |d E7B  |d FMG  |d AUM  |d OCLCO  |d NLE  |d TEFOD  |d OCLCQ  |d OCLCO  |d OCLCQ  |d FEM  |d OCLCQ  |d OCLCA  |d UIU  |d VT2  |d MOQ  |d OCLCQ  |d C6I  |d HS0  |d UKAHL  |d OCLCQ  |d OCLCO  |d OCLCQ 
019 |a 70277080  |a 326626734  |a 759520541  |a 856987222  |a 859883053  |a 861530077  |a 968014286  |a 969024167  |a 1019733171 
020 |a 9780596153465  |q (electronic bk.) 
020 |a 0596153465  |q (electronic bk.) 
020 |a 9780596553944  |q (electronic bk.) 
020 |a 0596553943  |q (electronic bk.) 
020 |z 0596008783 
020 |z 9780596008789 
024 8 |a 0596008783 
029 1 |a DEBSZ  |b 396385265 
035 |a (OCoLC)770008388  |z (OCoLC)70277080  |z (OCoLC)326626734  |z (OCoLC)759520541  |z (OCoLC)856987222  |z (OCoLC)859883053  |z (OCoLC)861530077  |z (OCoLC)968014286  |z (OCoLC)969024167  |z (OCoLC)1019733171 
037 |a 494853D1-42EF-465D-93D5-DABE4C2513EB  |b OverDrive, Inc.  |n http://www.overdrive.com 
050 4 |a TK5105.59  |b .W56 2005eb 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8  |2 22 
049 |a UAMI 
100 1 |a Windley, Phillip J.,  |d 1958- 
245 1 0 |a Digital identity /  |c Phillip J. Windley. 
246 1 4 |a Unmasking Identity Management Architecture (IMA) 
260 |a Sebastopol, CA :  |b O'Reilly,  |c ©2005. 
300 |a 1 online resource (xviii, 234) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file 
500 |a Includes index. 
520 |a "The rise of network-based, automated services in the past decade has definitely changed the way businesses operate, but not always for the better. Offering services, conducting transactions and moving data on the Web opens new opportunities, but many CTOs and CIOs are more concerned with the risks. Like the rulers of medieval cities, they've adopted a siege mentality, building walls to keep the bad guys out. It makes for a secure perimeter, but hampers the flow of commerce."--Back cover 
588 0 |a Print version record. 
542 |f Copyright © O'Reilly Media, Inc.  |g 2005. 
505 0 |a Digital Identity; Preface; Conventions Used in This Book; Comments and Questions; Safari Enabled; Acknowledgments; 1. Introduction; 1.2. Digital Identity Matters; 1.3. Using Digital Identity; 1.4. The Business Context of Identity; 1.5. Foundational Technologies for Digital Identity; 1.6. Identity Management Architectures; 2. Defining Digital Identity; 2.2. Identity Scenarios in the Physical World; 2.3. Identity, Security, and Privacy; 2.4. Digital Identity Perspectives; 2.5. Identity Powershifts; 2.6. Conclusion; 3. Trust; 3.2. Trust and Evidence; 3.3. Trust and Risk 
505 8 |a 3.4. Reputation and Trust Communities3.5. Conclusion; 4. Privacy and Identity; 4.2. Privacy Pragmatism; 4.3. Privacy Drivers; 4.4. Privacy Audits; 4.5. Privacy Policy Capitalism; 4.6. Anonymity and Pseudonymity; 4.7. Privacy Principles; 4.8. Prerequisites; 4.9. Conclusion; 5. The Digital Identity Lifecycle; 5.2. Propagating; 5.3. Using; 5.4. Maintaining; 5.5. Deprovisioning; 5.6. Conclusion; 6. Integrity, Non-Repudiation, and Confidentiality; 6.2. Non-Repudiation; 6.3. Confidentiality; 6.3.1.2. Public key cryptography; 6.3.1.3. Hybrid key systems; 6.3.1.4. Public key cryptosystem algorithms 
505 8 |a 6.3.2. Message Digests and Hashes6.3.3. Digital Signatures; 6.3.4. Digital Certificates; 6.3.5. Certificate Authorities; 6.3.6. Certificate Revocations Lists; 6.3.7. Public-Key Infrastructures; 6.3.8. Going Further; 6.4. Conclusion; 7. Authentication; 7.2. Authentication Systems; 7.2.2. ID and Password; 7.2.2.2. Password reset; 7.2.3. Challenge-Response Systems; 7.2.4. Digital Certificates; 7.2.5. Biometric Devices; 7.2.6. Smart Cards; 7.3. Authentication System Properties; 7.3.2. Appropriate Level of Security; 7.3.3. Locational Transparency; 7.3.4. Protocol Insensitivity 
505 8 |a 7.3.5. Appropriate Level of Privacy7.3.6. Reliability; 7.3.7. Auditability; 7.3.8. Manageability; 7.3.9. Federation Support; 7.4. Conclusion; 8. Access Control; 8.1.2. Principle of Least Privilege; 8.1.3. Accountability Scales Better than Enforcement; 8.2. Authorization Patterns; 8.2.2. User-Based Permission Systems; 8.2.3. Access-Control Lists; 8.2.4. Role-Based Access Control; 8.3. Abstract Authorization Architectures; 8.4. Digital Certificates and Access Control; 8.5. Conclusion; 9. Names and Directories; 9.2. Naming; 9.2.2. Uniform Resource Indicators: A Universal Namespace 
505 8 |a 9.2.3. Cool URIs Don & t Change9.3. Directories; 9.3.2. An Example Directory; 9.3.3. Enterprise Directory Services; 9.3.3.2. RMIRegistry; 9.3.3.3. X.500: heavyweight directory services; 9.3.3.4. LDAP; 9.4. Aggregating Directory Information; 9.4.2. Virtual Directories; 9.5. Conclusion; 10. Digital Rights Management; 10.2. The DRM Battle; 10.3. Apple iTunes: A Case Study in DRM; 10.4. Features of DRM; 10.5. DRM Reference Architecture; 10.6. Trusted Computing Platforms; 10.7. Specifying Rights; 10.8. Conclusion; 11. Interoperability Standards; 11.2. Integrity and Non-Repudiation: XML Signature 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Data protection. 
650 0 |a Computer crimes  |x Prevention. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Protection de l'information (Informatique) 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Computer crimes  |x Prevention.  |2 fast  |0 (OCoLC)fst00872068 
650 7 |a Computer networks  |x Security measures.  |2 fast  |0 (OCoLC)fst00872341 
650 7 |a Data protection.  |2 fast  |0 (OCoLC)fst00887958 
776 0 8 |i Print version:  |a Windley, Phillip J., 1958-  |t Digital identity.  |d Sebastopol, CA : O'Reilly, ©2005  |z 0596008783  |w (DLC) 2006274918  |w (OCoLC)61266094 
856 4 0 |u https://learning.oreilly.com/library/view/~/0596008783/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Askews and Holts Library Services  |b ASKH  |n AH29297936 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL540311 
938 |a ebrary  |b EBRY  |n ebr10758238 
938 |a EBSCOhost  |b EBSC  |n 413675 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n cis28428820 
938 |a YBP Library Services  |b YANK  |n 7353830 
994 |a 92  |b IZTAP