Synopses & Reviews
As the demand for data and information management continues to grow, so does the need to maintain and improve the security of databases, applications, and information systems. In order to effectively protect this data against evolving threats, an up-to-date understanding of the mechanisms for securing semantic Web technologies is essential.
Reviewing cutting-edge developments, Secure Semantic Service-Oriented Systems focuses on confidentiality, privacy, trust, and integrity management for Web services. It demonstrates the breadth and depth of applications of these technologies in multiple domains. The author lays the groundwork with discussions of concepts in trustworthy information systems and security for service-oriented architecture. Next, she covers secure Web services and applications discussing how these technologies are used in secure interoperability, national defense, and medical applications.
Divided into five parts, the book describes the various aspects of secure service oriented information systems; including confidentiality, trust management, integrity, and data quality. It evaluates knowledge management and e-business concepts in services technologies, information management, semantic Web security, and service-oriented computing. You will also learn how it applies to Web services, service-oriented analysis and design, and specialized and semantic Web services.
The author covers security and design methods for service-oriented analysis, access control models for Web Services, identity management, access control and delegation, and confidentiality. She concludes by examining privacy, trust, and integrity, the relationship between secure semantic Web technologies and services, secure ontologies, and RDF. The book also provides specific consideration to activity management such as e-business, collaboration, healthcare, and finance.
An exploration of security issues for the SOA and web services, this book reviews the developments in web services and web service-oriented architectures and describe ways of securing these technologies. It focuses on confidentiality, privacy, trust, and integrity management. The author demonstrates the breadth and depth of the applications of these technologies in multiple domains. He lays the groundwork with discussions of concepts in trustworthy information systems and security for SOA, then covers secure web services and applications. The book discusses these technologies in secure interoperability, defense, and medical applications.