Advances in Enterprise Information Technology Security Djamel Khadraoui Public Research Centre Henri Toudor, Luxembourg Francine Herrmann University Paul Vertaine-Metz, France Information science reference Hershey • New York Acquisitions Editor: Development Editor: Senior Managing Editor: Managing Editor: Assistant Managing Editor: Copy Editor: Typesetter: Cover Design: Printed at: Kristin Klinger Kristin Roth Jennifer Neidig Sara Reed Sharon Berger Becky Shore Jamie Snavely Lisa Tosheff Yurchak Printing Inc. Published in the United States of America by Information Science Reference (an imprint of IGI Global) 701 E. Chocolate Avenue, Suite 200 Hershey PA 17033 Tel: 717-533-8845 Fax: 717-533-8661 E-mail:
[email protected] Web site: http://www.igi-pub.com/reference and in the United Kingdom by Information Science Reference (an imprint of IGI Global) 3 Henrietta Street Covent Garden London WC2E 8LU Tel: 44 20 7240 0856 Fax: 44 20 7379 0609 Web site: http://www.eurospanonline.com Copyright © 2007 by IGI Global. All rights reserved. No part of this publication may be reproduced, stored or distributed in any form or by any means, electronic or mechanical, including photocopying, without written permission from the publisher. Product or company names used in this set are for identification purposes only. Inclusion of the names of the products or companies does not indicate a claim of ownership by IGI Global of the trademark or registered trademark. Library of Congress Cataloging-in-Publication Data Advances in enterprise information technology security / Djamel Khadraoui and Francine Herrmann, editors. p. cm. Summary: “This book provides a broad working knowledge of all the major security issues affecting today’s enterprise IT activities. Multiple techniques, strategies, and applications are thoroughly examined, presenting the tools to address opportunities in the field.It is an all-in-one reference for IT managers, network administrators, researchers, and students”--Provided by publisher. Includes bibliographical references and index. ISBN 978-1-59904-090-5 (hardcover) -- ISBN 978-1-59904-092-9 (ebook) 1. Business enterprises--Computer networks--Security measures. 2. Information technology--Security measures. 3. Computer security. 4. Data protection. I. Khadraoui, Djamel. II. Herrmann, Francine. HF5548.37.A38 2007 005.8--dc22 2007007267 British Cataloguing in Publication Data A Cataloguing in Publication record for this book is available from the British Library. All work contributed to this book set is new, previously-unpublished material. The views expressed in this book are those of the authors, but not necessarily of the publisher. Table of Contents Foreword . ............................................................................................................................................ xii Preface . ............................................................................................................................................... xiv Acknowledgment . ............................................................................................................................xviii Section I Security Architectures Chapter I Security Architectures / Sophie Gastellier-Prevost and Maryline Laurent-Maknavicius........................ 1 Chapter II Security in GRID Computing / Eric Garcia, Hervé Guyennet, Fabien Hantz, and Jean-Christophe Lapayre....................................................................................................................... 20 Chapter III Security of Symbian Based Mobile Devices / Göran Pulkkis, Kay J. Grahn, Jonny Karlsson, and Nhat Dai Tran....................................................................................