Note: Page numbers followed by “f” and “t” refer to figures and tables, respectively.
cloud computing, security challenges, 392
leveraging semantic web technologies
DEMONS ontological access control model, 499–502
implementing RBAC, with ontologies, 494–495
online social networks (OSNs), 498–499
ontology-based context awareness, 496–497
state-of-the-art ontological models, 502–503
virtual infrastructure setup, 392
Access control lists (ACLs), 425–426
Access control ontology (ACO), 498–499
Acquisition program protection planning, 11f
A3 cross-site scripting, 483
Get Emerging Trends in ICT Security now with O’Reilly online learning.
O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.