Hugendubel.info - Die B2B Online-Buchhandlung 

Merkliste
Die Merkliste ist leer.
Bitte warten - die Druckansicht der Seite wird vorbereitet.
Der Druckdialog öffnet sich, sobald die Seite vollständig geladen wurde.
Sollte die Druckvorschau unvollständig sein, bitte schliessen und "Erneut drucken" wählen.

Engineering Secure Future Internet Services and Systems

Current Research
BuchKartoniert, Paperback
393 Seiten
Englisch
Springererschienen am21.05.20142014
This State-of-the-Art Survey contains a selection of papers representing state-of-the-art results in the engineering of secure software-based Future Internet services and systems, produced by the NESSoS project researchers.mehr
Verfügbare Formate
BuchKartoniert, Paperback
EUR53,49
E-BookPDF1 - PDF WatermarkE-Book
EUR53,49

Produkt

KlappentextThis State-of-the-Art Survey contains a selection of papers representing state-of-the-art results in the engineering of secure software-based Future Internet services and systems, produced by the NESSoS project researchers.
Details
ISBN/GTIN978-3-319-07451-1
ProduktartBuch
EinbandartKartoniert, Paperback
Verlag
Erscheinungsjahr2014
Erscheinungsdatum21.05.2014
Auflage2014
Seiten393 Seiten
SpracheEnglisch
IllustrationenVIII, 393 p. 131 illus.
Artikel-Nr.15468531

Inhalt/Kritik

Inhaltsverzeichnis
A Structured Comparison of Security Standards.- Empirical Assessment of Security Requirements and Architecture: Lessons Learned.- STS-Tool: Security Requirements Engineering for Socio-Technical Systems.- Model-Driven Development of a Secure eHealth Application.- Modeling Security Features of Web Applications.- On the Synthesis of Secure Services Composition.- Privacy and Access Control in Federated Social Networks.- Engineering Trust-Awareness and Self-adaptability in Services and Systems.- Validation of Access Control Systems.- Evaluation of Engineering Approaches in the Secure Software Development Life Cycle.- A Toolchain for Designing and Testing Access Control Policies.- Verification of Authorization Policies Modified by Delegation.- ISMS-CORAS: A Structured Method for Establishing an ISO 27001 Compliant Information Security Management System.- Divide and Conquer - Towards a Notion of Risk Model Encapsulation.- Preserving Data Privacy in e-Health.mehr

Schlagworte

Autor