Cargando…

Digital identity /

"The rise of network-based, automated services in the past decade has definitely changed the way businesses operate, but not always for the better. Offering services, conducting transactions and moving data on the Web opens new opportunities, but many CTOs and CIOs are more concerned with the r...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Windley, Phillip J., 1958-
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Sebastopol, CA : O'Reilly, ©2005.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)
Tabla de Contenidos:
  • Digital Identity; Preface; Conventions Used in This Book; Comments and Questions; Safari Enabled; Acknowledgments; 1. Introduction; 1.2. Digital Identity Matters; 1.3. Using Digital Identity; 1.4. The Business Context of Identity; 1.5. Foundational Technologies for Digital Identity; 1.6. Identity Management Architectures; 2. Defining Digital Identity; 2.2. Identity Scenarios in the Physical World; 2.3. Identity, Security, and Privacy; 2.4. Digital Identity Perspectives; 2.5. Identity Powershifts; 2.6. Conclusion; 3. Trust; 3.2. Trust and Evidence; 3.3. Trust and Risk
  • 3.4. Reputation and Trust Communities3.5. Conclusion; 4. Privacy and Identity; 4.2. Privacy Pragmatism; 4.3. Privacy Drivers; 4.4. Privacy Audits; 4.5. Privacy Policy Capitalism; 4.6. Anonymity and Pseudonymity; 4.7. Privacy Principles; 4.8. Prerequisites; 4.9. Conclusion; 5. The Digital Identity Lifecycle; 5.2. Propagating; 5.3. Using; 5.4. Maintaining; 5.5. Deprovisioning; 5.6. Conclusion; 6. Integrity, Non-Repudiation, and Confidentiality; 6.2. Non-Repudiation; 6.3. Confidentiality; 6.3.1.2. Public key cryptography; 6.3.1.3. Hybrid key systems; 6.3.1.4. Public key cryptosystem algorithms
  • 6.3.2. Message Digests and Hashes6.3.3. Digital Signatures; 6.3.4. Digital Certificates; 6.3.5. Certificate Authorities; 6.3.6. Certificate Revocations Lists; 6.3.7. Public-Key Infrastructures; 6.3.8. Going Further; 6.4. Conclusion; 7. Authentication; 7.2. Authentication Systems; 7.2.2. ID and Password; 7.2.2.2. Password reset; 7.2.3. Challenge-Response Systems; 7.2.4. Digital Certificates; 7.2.5. Biometric Devices; 7.2.6. Smart Cards; 7.3. Authentication System Properties; 7.3.2. Appropriate Level of Security; 7.3.3. Locational Transparency; 7.3.4. Protocol Insensitivity
  • 7.3.5. Appropriate Level of Privacy7.3.6. Reliability; 7.3.7. Auditability; 7.3.8. Manageability; 7.3.9. Federation Support; 7.4. Conclusion; 8. Access Control; 8.1.2. Principle of Least Privilege; 8.1.3. Accountability Scales Better than Enforcement; 8.2. Authorization Patterns; 8.2.2. User-Based Permission Systems; 8.2.3. Access-Control Lists; 8.2.4. Role-Based Access Control; 8.3. Abstract Authorization Architectures; 8.4. Digital Certificates and Access Control; 8.5. Conclusion; 9. Names and Directories; 9.2. Naming; 9.2.2. Uniform Resource Indicators: A Universal Namespace
  • 9.2.3. Cool URIs Don & t Change9.3. Directories; 9.3.2. An Example Directory; 9.3.3. Enterprise Directory Services; 9.3.3.2. RMIRegistry; 9.3.3.3. X.500: heavyweight directory services; 9.3.3.4. LDAP; 9.4. Aggregating Directory Information; 9.4.2. Virtual Directories; 9.5. Conclusion; 10. Digital Rights Management; 10.2. The DRM Battle; 10.3. Apple iTunes: A Case Study in DRM; 10.4. Features of DRM; 10.5. DRM Reference Architecture; 10.6. Trusted Computing Platforms; 10.7. Specifying Rights; 10.8. Conclusion; 11. Interoperability Standards; 11.2. Integrity and Non-Repudiation: XML Signature