Security Technologies for the World Wide Web
Artech House Publishers (Verlag)
978-1-58053-045-3 (ISBN)
- Titel erscheint in neuer Auflage
- Artikel merken
An analysis of trends in World Wide Web security, and an evaluation of existing technologies, such as anonymity services and security products. It demonstrates how to ensure that electronic commerce functions and financial transactions on your Website are executed with the utmost security and protection, and covers content protection and the benefits and drawbacks of censorship on the Web. It also addresses topics of concern to WWW security professionals.
Rolf Oppliger is the founder and owner of eSECURITY Technologies Rolf Oppliger (www.esecurity.ch) and works for the Swiss Federal Strategy Unit for Information Technology (FSUIT) . He is also the author of Security Technologies for the World Wide Web (Artech House, 1999) , Internet and Intranet Security (Artech House, 1998), and Authentication Systems for Secure Networks (Artech House, 1996). Dr. Oppliger is the computer security series editor at Artech House. He received his M.Sc. and Ph.D. in Computer Science from the University of Berne, Switzerland, and the Venia Legendi in Computer Science from the University of Z?rich, Switzerland).
Introduction - the Internet; the World Wide Web; vulnerabilities, threats and countermeasures; generic security model; HTTP user authentication and authorization - basic authentication; digest authentication; certificate-based authentication; authorization and access control; proxy servers and firewalls - packet filtering and stateful inspection; circuit-level gateways; firewall configurations; cryptographic techniques - one-way hash configurations; secret key cryptography; public key cryptography; legal considerations; notation; Internet security protocols - network access layer security protocols; Internet layer security protocols; transport layer security protocols; application layer security protocols; the SSL and TLS protocols - the SSL protocol; the TLS protocol; firewall tunnelling; electronic payment schemes; managing certificates - a distributed certificate management system; attribute certificates; certificate revocation; executable content - binary mail attachments; scripting languages; Java applets; Activex controls; mobile code and agent-based systems - protecting the run-time environment; protecting the mobile code; copyright protection -watermarking; fingerprinting; a secure document distribution system; privacy protection and anonymous browsing - cookies; the anonymiser; onion routing; lucent personalized Web assistant; crowds; Janus; Taz servers and the Rewebber network; censorship on the WWW - content blocking; content rating and the platform for Internet content selection; area of further study - provably secure cryptographic techniques; trust management; high-speed networking; multicat communications; resource reservation and billing schemes.
Erscheint lt. Verlag | 1.1.2000 |
---|---|
Reihe/Serie | Computing Library S. |
Zusatzinfo | illustrations |
Verlagsort | Norwood |
Sprache | englisch |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Informatik ► Theorie / Studium ► Kryptologie | |
Mathematik / Informatik ► Informatik ► Web / Internet | |
ISBN-10 | 1-58053-045-1 / 1580530451 |
ISBN-13 | 978-1-58053-045-3 / 9781580530453 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich