Indices1
Architectures and Protocols for Secure Information Technology Infrastructures

Architectures and Protocols for Secure Information Technology Infrastructures

Antonio Ruiz-Martinez (University of Murcia, Spain), Rafael Marin-Lopez (University of Murcia, Spain) and Fernando Pereniguez-Garcia (University of Murcia, Spain)
Copyright: © 2014 |Pages: 427
ISBN13: 9781466645141|ISBN10: 1466645148|EISBN13: 9781466645158
DOI: 10.4018/978-1-4666-4514-1
Cite Book Cite Book

MLA

Ruiz-Martinez, Antonio, Rafael Marin-Lopez, and Fernando Pereniguez-Garcia. "Architectures and Protocols for Secure Information Technology Infrastructures." IGI Global, 2014. 1-427. Web. 11 Jan. 2020. doi:10.4018/978-1-4666-4514-1

APA

Ruiz-Martinez, A., Marin-Lopez, R., & Pereniguez-Garcia, F. (2014). Architectures and Protocols for Secure Information Technology Infrastructures (pp. 1-427). Hershey, PA: IGI Global. doi:10.4018/978-1-4666-4514-1

Chicago

Ruiz-Martinez, Antonio, Rafael Marin-Lopez, and Fernando Pereniguez-Garcia. "Architectures and Protocols for Secure Information Technology Infrastructures." 1-427 (2014), accessed January 11, 2020. doi:10.4018/978-1-4666-4514-1

Export Reference

Mendeley
Favorite Full-Book Download

With the constant stream of emails, social networks, and online bank accounts, technology has become a pervasive part of our everyday lives, making the security of these information systems an essential requirement for both users and service providers.

Architectures and Protocols for Secure Information Technology Infrastructures investigates different protocols and architectures that can be used to design, create, and develop security infrastructures by highlighting recent advances, trends, and contributions to the building blocks for solving security issues. This book is essential for researchers, engineers, and professionals interested in exploring recent advances in ICT security.

Table of Contents

Reset
Front Materials
Title Page
This content has been removed at the discretion of the publisher and the editors.
Copyright Page
This content has been removed at the discretion of the publisher and the editors.
Advances in Information Security, Privacy, and Ethics
This content has been removed at the discretion of the publisher and the editors.
Editorial Advisory Board and List of Reviewers
This content has been removed at the discretion of the publisher and the editors.
Foreword
This content has been removed at the discretion of the publisher and the editors.
Preface
This content has been removed at the discretion of the publisher and the editors.
Acknowledgment
This content has been removed at the discretion of the publisher and the editors.
Chapters
Chapter 1
State-of-the-Art  (pages 21-22)
State-of-the-Art
This content has been removed at the discretion of the publisher and the editors.
Chapter 1
Jaydip Sen (Tata Consultancy Services Ltd., India)
Cloud computing transforms the way Information Technology (IT) is consumed and managed, promising improved cost efficiencies, accelerated innovation, faster time-to-market, and the ability to scale applications on demand (Leighton...
Security and Privacy Issues in Cloud Computing
This content has been removed at the discretion of the publisher and the editors.
Chapter 2
Gerard Draper-Gil (University of the Balearic Islands, Spain), Josep-Lluís Ferrer-Gomila (University of the Balearic Islands, Spain), M. Francisca Hinarejos (University of the Balearic Islands, Spain), Arne Tauber (Graz University of Technology, Austria)
Most of the existent certified electronic mail proposals (found in scientific papers) have been designed without considering their deployment into traditional e-mail infrastructure (e.g., Internet mail system). In fact, there is not...
Towards a Certified Electronic Mail System
This content has been removed at the discretion of the publisher and the editors.
Chapter 3
Tayo Arulogun (Ladoke Akintola University of Technology, Nigeria), Ahmad AlSa'deh (University of Potsdam, Germany), Christoph Meinel (University of Potsdam, Germany)
Mobile Internet Protocol (MIP) enables a mobile node to be recognized via a single IP address while the node moves between different networks. MIP attains the connectivity to nodes everywhere without user intervention. One general...
Mobile IPv6: Mobility Management and Security Aspects
This content has been removed at the discretion of the publisher and the editors.
Cryptographic Algorithms and Security Protocols
This content has been removed at the discretion of the publisher and the editors.
Chapter 4
Ghada Zaibi (University of Sfax, Tunisia), Fabrice Peyrard (University of Toulouse, France), Abdennaceur Kachouri (University of Sfax, Tunisia), Danièle Fournier-Prunaret (CNRS-LAAS, INSA, Université de Toulouse, France), Mounir Samet (University of Toulouse, France)
A new and secure chaos-based block cipher for image encryption in wireless sensor networks is proposed. The security analysis and the performances of the proposed algorithm have been investigated. The statistical analysis includes...
A New Encryption Algorithm based on Chaotic Map for Wireless Sensor Network
This content has been removed at the discretion of the publisher and the editors.
Chapter 5
Md. Abdul Based (Norwegian University of Science and Technology, Norway)
A Polling booth-based Electronic Voting Scheme (PEVS) is presented in this chapter. The scheme allows only eligible voters to cast their ballots inside polling booths, and the ballots cast by the eligible voters are inalterable and...
A Polling Booth-Based Electronic Voting Scheme
This content has been removed at the discretion of the publisher and the editors.
Chapter 6
Hosnieh Rafiee (Hasso Plattner Institute, Germany), Martin von Löwis (Hasso Plattner Institute, Germany), Christoph Meinel (Hasso Plattner Institute, Germany)
The Domain Name System (DNS) is a necessary component of the Internet that allows hosts on the Internet to communicate with other hosts without needing to know their cryptic IP addresses. When this protocol was first introduced it...
Challenges and Solutions for DNS Security in IPv6
This content has been removed at the discretion of the publisher and the editors.
Chapter 3
Malware and Intrusion Detection Systems
This content has been removed at the discretion of the publisher and the editors.
Chapter 7
Vít Bukač (Masaryk University, Czech Republic), Vashek Matyáš (Masaryk University, Czech Republic)
In this chapter, the reader explores both the founding ideas and the state-of-the-art research on host-based intrusion detection systems. HIDSs are categorized by their intrusion detection method. Each category is thoroughly...
Host–Based Intrusion Detection Systems: Architectures, Solutions, and Challenges
This content has been removed at the discretion of the publisher and the editors.
Chapter 8
Yuxin Meng (City University of Hong Kong, China), Lam-For Kwok (City University of Hong Kong, China)
Intrusion Detection Systems (IDSs) have been widely implemented in various network environments as an essential component for current Information and Communications Technologies (ICT). However, false alarms are a big problem for...
Enhancing Intrusion Detection Systems Using Intelligent False Alarm Filter: Selecting the Best Machine Learning Algorithm
This content has been removed at the discretion of the publisher and the editors.
Chapter 9
Ciprian Pungila (West University of Timişoara, Romania), Viorel Negru (West University of Timişoara, Romania)
This chapter presents an outline of the challenges involved in constructing efficient malware detection engines using hybrid CPU/GPU-accelerated architectures and discusses how one can overcome such challenges. Starting with a...
Towards Building Efficient Malware Detection Engines Using Hybrid CPU/GPU-Accelerated Approaches
This content has been removed at the discretion of the publisher and the editors.
Chapter 4
Secure Platforms and Frameworks
This content has been removed at the discretion of the publisher and the editors.
Chapter 10
Alexandre B. Augusto (University of Porto, Portugal), Manuel E. Correia (University of Porto, Portugal)
The massive growth of the Internet and its services is currently being sustained by the mercantilization of users’ identities and private data. Traditional services on the Web require the user to disclose many unnecessary sensitive...
A Mobile-Based Attribute Aggregation Architecture for User-Centric Identity Management
This content has been removed at the discretion of the publisher and the editors.
Chapter 11
Klaus Stranacher (Graz University of Technology, Austria), Arne Tauber (Graz University of Technology, Austria), Thomas Zefferer (Graz University of Technology, Austria), Bernd Zwattendorfer (Graz University of Technology, Austria)
Architectures and protocols for secure information technology are crucial to satisfy security requirements of current e-government solutions. Identity plays a central role in most e-government solutions, as users typically need to be...
The Austrian Identity Ecosystem: An E-Government Experience
This content has been removed at the discretion of the publisher and the editors.
Chapter 12
Andrea Atzeni (Politecnico di Torino, Italy), John Lyle (University of Oxford, UK), Shamal Faily (University of Oxford, UK)
The need for integrated cross-platform systems is growing. Such systems can enrich the user experience, but also lead to greater security and privacy concerns than the sum of their existing components. To provide practical insights...
Developing Secure, Unified, Multi-Device, and Multi-Domain Platforms: A Case Study from the Webinos Project
This content has been removed at the discretion of the publisher and the editors.
Chapter 13
Alberto De la Rosa Algarín (University of Connecticut, USA), Steven A. Demurjian (University of Connecticut, USA), Timoteus B. Ziminski (University of Connecticut, USA), Yaira K. Rivera Sánchez (University of Connecticut, USA), Robert Kuykendall (Texas State University, USA)
Today’s applications are often constructed by bringing together functionality from multiple systems that utilize varied technologies (e.g. application programming interfaces, Web services, cloud computing, data mining) and...
Securing XML with Role-Based Access Control: Case Study in Health Care
This content has been removed at the discretion of the publisher and the editors.
Back Materials
Compilation of References
This content has been removed at the discretion of the publisher and the editors.
About the Contributors
This content has been removed at the discretion of the publisher and the editors.
Index
This content has been removed at the discretion of the publisher and the editors.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.