Publication Date: 2008
ISBN: 978-3-540-85735-8
Internet Resource: Please Login to download book
The book is organized in topical sections on trust, authentication, authorization and access control, reputation systems, security policies and identity management, intrusion detection and applications of game theory to IT security problems, and privacy.
Subject: Computer Science, IT security, business, game theory, identity, identity management, management, privacy, security, trust, Computers and Society, Management of Computing and Information Systems, Cryptology, Computer Communication Networks, Systems and Data Security, IT in Business