Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Policies for Web Security Services

Policies for Web Security Services
View Sample PDF
Author(s): Konstantina Stoupa (Aristotle University of Thessaloniki, Greece) and Athena Vakali (Aristotle University of Thessaloniki, Greece)
Copyright: 2006
Pages: 21
Source title: Web and Information Security
Source Author(s)/Editor(s): Elena Ferrari (University of Insubria at Como, Italy) and Bhavani Thuraisingham (The University of Texas at Dallas, USA)
DOI: 10.4018/978-1-59140-588-7.ch003


View Policies for Web Security Services on the publisher's website for pricing and purchasing information.


This chapter analyzes the various types of policies implemented by the Web security services. According to X.800 definition, there are five basic Web security services categories: authentication, non-repudiation, access control, data integrity, and data confidentiality. In this chapter, we discuss access control and data privacy services. Access control services may adopt various models according to the needs of the protected environment. In order to guide the design of access control models, several policy-expressing languages have been standardized. Our contribution is to describe and compare the various models and languages. Data privacy policies are categorized according to their purpose, that is, whether they express promises and preferences, manage the dissemination of privacy preferences, or handle the fulfillment of the privacy promises. The chapter is enriched with a discussion on the future trends in access control and data privacy.

Related Content

. © 2021. 31 pages.
. © 2021. 23 pages.
. © 2021. 20 pages.
. © 2021. 29 pages.
. © 2021. 27 pages.
. © 2021. 20 pages.
. © 2021. 20 pages.
Body Bottom