International contributors relate the latest security problems and solutions for protocols, architectures, and frameworks used in information technology infrastructures. Material is grouped in sections on state of the art, cryptographic algorithms and security protocols, malware and intrusion detection systems, and secure platforms and frameworks. Some topics addressed include securing XML with role-based access control in the health care environment, a mobile-based aggregation architecture for user-centric identity management, a new encryption algorithm based on chaotic maps for wireless sensor networks, and a polling booth-based electronic voting scheme. Other subjects are host-based instruction detection systems, security and privacy issues in cloud computing, and efforts towards a certified email system.
– Annotation ©2013 Book News Inc. Portland, OR