<< 1 >>
Rating: ![5 stars](http://www.reviewfocus.com/images/stars-5-0.gif) Summary: Advanced treatment of advanced topics Review: This three section collection of papers is for advanced architects who are exploring contemporary security strategies. The collection is divided into foundation material, concepts and implementation. The book has a fourth section, but it's an appendix that lists the author bios.The papers in this book are based on presentations given at two ECOOP'98 workshops: the Workshop on Distributed Object Security and the Workshop on Mobility: Secure Internet Mobile Computation. Unlike many books that are based on workshops and lecture notes, this one is more practical than academic. I like the fact that XML and Java are covered, and found the papers that deal with access controls filled with useful information. The paper by Blaze, Feigenbaum, Ioannidis, and Keromytis on the role of trust management in distributed systems, and Roth's paper on mutual protection of cooperating agents gave information that me and my team used to solve a design problem. Like most collections of computer science lecture notes the writing is vastly different from more popular books, but the information is there if you're willing to dig through dry writing. Also, this book is not for programmers who either don't have a computer science degree or are not familiar with computer science and software engineering.
Rating: ![5 stars](http://www.reviewfocus.com/images/stars-5-0.gif) Summary: Advanced treatment of advanced topics Review: This three section collection of papers is for advanced architects who are exploring contemporary security strategies. The collection is divided into foundation material, concepts and implementation. The book has a fourth section, but it's an appendix that lists the author bios. The papers in this book are based on presentations given at two ECOOP'98 workshops: the Workshop on Distributed Object Security and the Workshop on Mobility: Secure Internet Mobile Computation. Unlike many books that are based on workshops and lecture notes, this one is more practical than academic. I like the fact that XML and Java are covered, and found the papers that deal with access controls filled with useful information. The paper by Blaze, Feigenbaum, Ioannidis, and Keromytis on the role of trust management in distributed systems, and Roth's paper on mutual protection of cooperating agents gave information that me and my team used to solve a design problem. Like most collections of computer science lecture notes the writing is vastly different from more popular books, but the information is there if you're willing to dig through dry writing. Also, this book is not for programmers who either don't have a computer science degree or are not familiar with computer science and software engineering.
<< 1 >>
|