Language:
English
繁體中文
Help
圖資館首頁
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Innovative solutions for access cont...
~
Anjum, Adeel, (1982-)
Innovative solutions for access control management
Record Type:
Electronic resources : Monograph/item
Title/Author:
Innovative solutions for access control managementAhmad Kamran Malik, Adeel Anjum and Basit Raza, editors.
other author:
Malik, Ahmad Kamran,
Published:
Hershey, Pennsylvania :IGI Global,[2016]
Description:
1 online resource (330 p.) :ill.
Subject:
Database security.
Online resource:
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-0448-1
ISBN:
9781522504498 (ebk.)
Innovative solutions for access control management
Innovative solutions for access control management
[electronic resource] /Ahmad Kamran Malik, Adeel Anjum and Basit Raza, editors. - Hershey, Pennsylvania :IGI Global,[2016] - 1 online resource (330 p.) :ill.
Includes bibliographical references and index.
A survey on access control techniques for social networks / Yousra Asim, Ahmad Kamran Malik -- Identification and adaptive trust negotiation in interconnected systems / Eugene Sanzi, Steven A. Demurjian -- Intelligent multi-domain RBAC model / Rubina Ghazal [and 3 others] -- Leveraging UML for access control engineering in a collaboration on duty and adaptive workflow model that extends NIST RBAC / Solomon Berhe [and 4 others] -- Optimistic access control for collaborative applications / Asma Cherif, Abdessamad Imine -- Towards user authentication requirements for mobile computing / Yaira K. Rivera Sánchez, Steven A. Demurjian -- Usage-based access control for cloud applications / Yumna Ghazi [and 3 others] -- Managing access in cloud service chains using role-level agreements / Khurrum Mustafa Abbasi [and 4 others] -- Network intrusion detection using multi-objective ensemble classifiers / Arif Jamal Malik, Muhammad Haneef -- ICMetric-based secure communication / Shahzaib Tahir, Imran Rashid.
Restricted to subscribers or individual electronic text purchasers.
"This book features a comprehensive discussion on the trending topics and emergent research in IT security and governance, highlighting theoretical frameworks and best practices, as well as challenges and solutions within the topic of access control and management"--Provided by publisher.
Mode of access: World Wide Web.
ISBN: 9781522504498 (ebk.)Subjects--Topical Terms:
214959
Database security.
Subjects--Index Terms:
Adaptive trust negotiation
LC Class. No.: QA76.9.D314 / I57 2016e
Dewey Class. No.: 005.8
Innovative solutions for access control management
LDR
:02778nmm a2200409 i 4500
001
510355
003
IGIG
005
19991101163853.0
006
m eo d
007
cr bn |||m|||a
008
171129s2016 paua fob 001 0 eng d
010
$z
2016010969
020
$a
9781522504498 (ebk.)
020
$a
9781522504481 (hbk.)
035
$a
(CaBNVSL)gtp00565772
035
$a
(OCoLC)950459563
035
$a
0000000292
040
$a
CaBNVSL
$b
eng
$e
rda
$c
CaBNVSL
$d
CaBNVSL
050
0 0
$a
QA76.9.D314
$b
I57 2016e
082
0 0
$a
005.8
$2
23
245
0 0
$a
Innovative solutions for access control management
$h
[electronic resource] /
$c
Ahmad Kamran Malik, Adeel Anjum and Basit Raza, editors.
260
$a
Hershey, Pennsylvania :
$b
IGI Global,
$c
[2016]
300
$a
1 online resource (330 p.) :
$b
ill.
504
$a
Includes bibliographical references and index.
505
0
$a
A survey on access control techniques for social networks / Yousra Asim, Ahmad Kamran Malik -- Identification and adaptive trust negotiation in interconnected systems / Eugene Sanzi, Steven A. Demurjian -- Intelligent multi-domain RBAC model / Rubina Ghazal [and 3 others] -- Leveraging UML for access control engineering in a collaboration on duty and adaptive workflow model that extends NIST RBAC / Solomon Berhe [and 4 others] -- Optimistic access control for collaborative applications / Asma Cherif, Abdessamad Imine -- Towards user authentication requirements for mobile computing / Yaira K. Rivera Sánchez, Steven A. Demurjian -- Usage-based access control for cloud applications / Yumna Ghazi [and 3 others] -- Managing access in cloud service chains using role-level agreements / Khurrum Mustafa Abbasi [and 4 others] -- Network intrusion detection using multi-objective ensemble classifiers / Arif Jamal Malik, Muhammad Haneef -- ICMetric-based secure communication / Shahzaib Tahir, Imran Rashid.
506
$a
Restricted to subscribers or individual electronic text purchasers.
520
3
$a
"This book features a comprehensive discussion on the trending topics and emergent research in IT security and governance, highlighting theoretical frameworks and best practices, as well as challenges and solutions within the topic of access control and management"--Provided by publisher.
530
$a
Also available in print.
538
$a
Mode of access: World Wide Web.
588
$a
Description based on title screen (IGI Global, viewed 05/20/2016).
650
0
$a
Database security.
$3
214959
650
0
$a
Computer security.
$3
184416
650
0
$a
Data protection.
$3
202312
650
0
$a
Computers
$x
Access control.
$3
219159
653
$a
Adaptive trust negotiation
653
$a
Cloud applications
653
$a
Collaborative environments
653
$a
Mobile computing
653
$a
Network intrusion detection
653
$a
Social media
653
$a
User authentication requirements
700
1
$a
Malik, Ahmad Kamran,
$d
1973-
$e
editor.
$3
777854
700
1
$a
Anjum, Adeel,
$d
1982-
$e
editor.
$3
777855
700
1
$a
Raza, Basit,
$d
1976-
$e
editor.
$3
777856
856
4 0
$u
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-0448-1
based on 0 review(s)
ALL
電子館藏
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
000000140494
電子館藏
1圖書
電子書
EB QA76.9.D314 I57 [2016]
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Multimedia file
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-0448-1
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login