You are previewing Architectures and Protocols for Secure Information Technology Infrastructures.
O'Reilly logo
Architectures and Protocols for Secure Information Technology Infrastructures

Book Description

With the constant stream of emails, social networks, and online bank accounts, technology has become a pervasive part of our everyday lives, making the security of these information systems an essential requirement for both users and service providers. Architectures and Protocols for Secure Information Technology Infrastructures investigates different protocols and architectures that can be used to design, create, and develop security infrastructures by highlighting recent advances, trends, and contributions to the building blocks for solving security issues. This book is essential for researchers, engineers, and professionals interested in exploring recent advances in ICT security.

Table of Contents

  1. Cover
  2. Title Page
  3. Copyright Page
  4. Book Series
  5. Editorial Advisory Board and List of Reviewers
    1. Editorial Advisory Board
    2. List of Reviewers
  6. Foreword
  7. Preface
    1. INTRODUCTION
    2. BOOK ORGANIZATION
  8. Acknowledgment
  9. Section 1: State-of-the-Art
    1. Chapter 1: Security and Privacy Issues in Cloud Computing
      1. ABSTRACT
      2. INTRODUCTION
      3. ARCHITECTURE OF CLOUD COMPUTING
      4. CLOUD COMPUTING SECURITY AND PRIVACY ISSUES
      5. SOME PROPOSITIONS FOR SECURITY IN CLOUD COMPUTING
      6. STANDARDIZATION ACTIVITIES IN CLOUD COMPUTING
      7. EMERGING TRENDS IN SECURITY AND PRIVACY IN CLOUD COMPUTING
      8. CONCLUSION
    2. Chapter 2: Towards a Certified Electronic Mail System
      1. ABSTRACT
      2. INTRODUCTION
      3. INTERNET E-MAIL
      4. CERTIFIED ELECTRONIC MAIL
      5. STATE OF THE ART
      6. GUIDELINES FOR A PRACTICAL CERTIFIED E-MAIL PROTOCOL
      7. CONCLUSION
    3. Chapter 3: Mobile IPv6
      1. ABSTRACT
      2. INTRODUCTION
      3. MIPV6 DESIGN
      4. MIPV6 MOBILITY MANAGEMENTS AND SECURITY ISSUES
      5. POTENTIAL SOURCES OF SECURITY CONCERNS IN MIPV6
      6. FUTURE RESEARCH DIRECTIONS
      7. CONCLUSION
      8. APPENDIX
  10. Section 2: Cryptographic Algorithms and Security Protocols
    1. Chapter 4: A New Encryption Algorithm based on Chaotic Map for Wireless Sensor Network
      1. ABSTRACT
      2. INTRODUCTION
      3. OVERVIEW OF CHAOS-BASED CRYPTOGRAPHY
      4. PROPOSED ALGORITHM
      5. SECURITY ANALYSIS
      6. IMPLEMENTATION ON WIRELESS SENSOR NETWORK
      7. CONCLUSION
    2. Chapter 5: A Polling Booth-Based Electronic Voting Scheme
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND AND RELATED WORK
      4. THE POLLING BOOTH-BASED ELECTRONIC VOTING SCHEME (PEVS)
      5. SECURITY ANALYSIS OF PEVS
      6. CONCLUSION AND FUTURE WORK
      7. APPENDIX
    3. Chapter 6: Challenges and Solutions for DNS Security in IPv6
      1. ABSTRACT
      2. INTRODUCTION
      3. DOMAIN NAME SYSTEM (DNS)
      4. DNS FOR IPV6
      5. DNS SECURITY
      6. CONCLUSION
  11. Section 3: Malware and Intrusion Detection Systems
    1. Chapter 7: Host–Based Intrusion Detection Systems
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. MAIN FOCUS OF THE CHAPTER
      5. FUTURE RESEARCH DIRECTIONS
      6. CONCLUSION
    2. Chapter 8: Enhancing Intrusion Detection Systems Using Intelligent False Alarm Filter
      1. ABSTRACT
      2. 1. INTRODUCTION
      3. BACKGROUND AND RELATED WORK
      4. OUR PROPOSED METHOD
      5. CONCLUSION AND FUTURE WORK
    3. Chapter 9: Towards Building Efficient Malware Detection Engines Using Hybrid CPU/GPU-Accelerated Approaches
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. TOWARDS EFFICIENT HYBRID CPU/GPU ARCHITECTURES FOR MALWARE DETECTION
      5. TOWARDS MOBILE IMPLEMENTATIONS
      6. FUTURE RESEARCH DIRECTIONS
      7. CONCLUSION
  12. Section 4: Secure Platforms and Frameworks
    1. Chapter 10: A Mobile-Based Attribute Aggregation Architecture for User-Centric Identity Management
      1. ABSTRACT
      2. 1. INTRODUCTION
      3. 2. ARCHITECTURE
      4. 3. ENROLLMENT PROCESSES AND USAGE CASE SCENARIO
      5. 4. CONCLUSION
    2. Chapter 11: The Austrian Identity Ecosystem
      1. ABSTRACT
      2. INTRODUCTION
      3. E-GOVERNMENT IN AUSTRIA
      4. THE AUSTRIAN E-ID CONCEPT
      5. USE CASES FOR IDENTIFICATION AND AUTHENTICATION
      6. CONCLUSION
    3. Chapter 12: Developing Secure, Unified, Multi-Device, and Multi-Domain Platforms
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. RELATED WORK
      5. THREAT MODEL
      6. IDENTITY AND AUTHENTICATION
      7. SESSION MANAGEMENT
      8. DISTRIBUTED ACCESS CONTROL POLICIES
      9. THREAT-AWARE API DEVELOPMENT
      10. SECURE STORAGE
      11. DISCUSSION
      12. CONCLUSION AND FUTURE WORK
    4. Chapter 13: Securing XML with Role-Based Access Control
      1. ABSTRACT
      2. 1. INTRODUCTION
      3. 2. BACKGROUND
      4. 3. SECURITY FRAMEWORK FOR XML
      5. 4. CASE STUDY OF HEALTHCARE APPLICATIONS
      6. 5. FUTURE TRENDS AND RESEARCH DIRECTIONS
      7. 6. CONCLUSION
  13. Compilation of References
  14. About the Contributors