You are previewing Innovative Solutions for Access Control Management.
O'Reilly logo
Innovative Solutions for Access Control Management

Book Description

Technological innovation and evolution continues to improve personal and professional lifestyles, as well as general organizational and business practices; however, these advancements also create potential issues in the security and privacy of the user’s information. Innovative Solutions for Access Control Management features a comprehensive discussion on the trending topics and emergent research in IT security and governance. Highlighting theoretical frameworks and best practices, as well as challenges and solutions within the topic of access control and management, this publication is a pivotal reference source for researchers, practitioners, students, database vendors, and organizations within the information technology and computer science fields.

Table of Contents

  1. Cover
  2. Title Page
  3. Copyright Page
  4. Book Series
    1. Mission
    2. Coverage
  5. Editorial Advisory Board
  6. List of Reviewers
  7. Preface
    1. ORGANIZATION OF THE BOOK
    2. SECTION 1: ACCESS CONTROL FOR COLLABORATIVE ENVIRONMENTS
    3. SECTION 2: MOBILE, CLOUD, AND NETWORK SECURITY
    4. CONCLUSION
    5. REFERENCES
  8. Acknowledgment
  9. Section 1: Access Control for Collaborative Environments
    1. Chapter 1: A Survey on Access Control Techniques for Social Networks
      1. ABSTRACT
      2. INTRODUCTION
      3. DISCUSSION
      4. CONCLUSION
      5. REFERENCES
      6. KEY TERMS AND DEFINITIONS
    2. Chapter 2: Identification and Adaptive Trust Negotiation in Interconnected Systems
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. TRUST IN MEDICAL SYSTEMS
      5. AN APPROACH TO ADAPTIVE TRUST NEGOTIATION
      6. FUTURE TRENDS
      7. CONCLUSION
      8. REFERENCES
      9. KEY TERMS AND DEFINITIONS
    3. Chapter 3: Intelligent Multi-Domain RBAC Model
      1. ABSTRACT
      2. INTRODUCTION
      3. RELATED WORK
      4. PROPOSED WORK
      5. CONCLUSION AND FUTURE WORK
      6. REFERENCES
      7. KEY TERMS AND DEFINITIONS
    4. Chapter 4: Leveraging UML for Access Control Engineering in a Collaboration on Duty and Adaptive Workflow Model that Extends NIST RBAC
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. CONCLUSION
      5. REFERENCES
      6. KEY TERMS AND DEFINITIONS
    5. Chapter 5: Optimistic Access Control for Collaborative Applications
      1. ABSTRACT
      2. INTRODUCTION
      3. RELATED WORKS
      4. COLLABORATION PROTOCOL
      5. CONCLUSION
      6. REFERENCES
      7. KEY TERMS AND DEFINITIONS
      8. ENDNOTE
  10. Section 2: Mobile, Cloud, and Network Security
    1. Chapter 6: Towards User Authentication Requirements for Mobile Computing
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND AND MOTIVATION
      4. SECURITY CONCEPTS IMPACTING MOBILE AUTHENTICATION
      5. AUTHENTICATION IN MOBILE HEALTHCARE APPLICATIONS
      6. AUTHENTICATION REQUIREMENTS IN MOBILE COMPUTING
      7. FUTURE TRENDS
      8. CONCLUSION
      9. REFERENCES
      10. ADDITIONAL READING
      11. KEY TERMS AND DEFINITIONS
    2. Chapter 7: Usage-Based Access Control for Cloud Applications
      1. ABSTRACT
      2. INTRODUCTION
      3. USAGE CONTROL MODEL (UCON)
      4. UCON IN CLOUD
      5. RELATED WORK
      6. UCON PROFILE SPECIFICATION
      7. REALIZATION OF XACML PROFILE FOR UCON
      8. IMPLEMENTING UCON ON CLOUD: A CASE STUDY
      9. CONCLUSION
      10. REFERENCES
      11. KEY TERMS AND DEFINITIONS
    3. Chapter 8: Managing Access in Cloud Service Chains Using Role-Level Agreements
      1. ABSTRACT
      2. INTRODUCTION
      3. CONCLUSION
      4. REFERENCES
      5. KEY TERMS AND DEFINITIONS
    4. Chapter 9: Network Intrusion Detection Using Multi-Objective Ensemble Classifiers
      1. ABSTRACT
      2. INTRODUCTION
      3. PROPOSED TECHNIQUE
      4. EXPERIMENTAL SETUP AND RESULTS
      5. DISCUSSION
      6. CONCLUSION
      7. REFERENCES
    5. Chapter 10: ICMetric-Based Secure Communication
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. MAJOR CONCERNS OF SECURE COMMUNICATION SCHEMES
      5. ICMETRIC TECHNOLOGY
      6. KEY GENERATION/MANAGEMENT SCHEMES FOR CONTROLLED GROUP COMMUNICATION
      7. ATTACK MODEL
      8. COMPUTATIONAL COST ANALYSIS
      9. FUTURE RESEARCH DIRECTIONS
      10. CONCLUSION
      11. REFERENCES
      12. KEY TERMS AND DEFINITIONS
  11. Compilation of References
  12. About the Contributors