Choo / Ko | The Cloud Security Ecosystem | E-Book | sack.de
E-Book

E-Book, Englisch, 570 Seiten

Choo / Ko The Cloud Security Ecosystem

Technical, Legal, Business and Management Issues
1. Auflage 2015
ISBN: 978-0-12-801780-7
Verlag: Elsevier Science & Techn.
Format: EPUB
Kopierschutz: 6 - ePub Watermark

Technical, Legal, Business and Management Issues

E-Book, Englisch, 570 Seiten

ISBN: 978-0-12-801780-7
Verlag: Elsevier Science & Techn.
Format: EPUB
Kopierschutz: 6 - ePub Watermark



Drawing upon the expertise of world-renowned researchers and experts, The Cloud Security Ecosystem comprehensively discusses a range of cloud security topics from multi-disciplinary and international perspectives, aligning technical security implementations with the most recent developments in business, legal, and international environments. The book holistically discusses key research and policy advances in cloud security - putting technical and management issues together with an in-depth treaties on a multi-disciplinary and international subject. The book features contributions from key thought leaders and top researchers in the technical, legal, and business and management aspects of cloud security. The authors present the leading edge of cloud security research, covering the relationships between differing disciplines and discussing implementation and legal challenges in planning, executing, and using cloud security. - Presents the most current and leading-edge research on cloud security from a multi-disciplinary standpoint, featuring a panel of top experts in the field - Focuses on the technical, legal, and business management issues involved in implementing effective cloud security, including case examples - Covers key technical topics, including cloud trust protocols, cryptographic deployment and key management, mobile devices and BYOD security management, auditability and accountability, emergency and incident response, as well as cloud forensics - Includes coverage of management and legal issues such as cloud data governance, mitigation and liability of international cloud deployment, legal boundaries, risk management, cloud information security management plans, economics of cloud security, and standardization efforts

Dr Kim-Kwang Raymond Choo is a Fulbright Scholar and Senior Lecturer at the University of South Australia. He has (co)authored a number of publications in the areas of anti-money laundering, cyber and information security, and digital forensics including a book published in Springer's 'Advances in Information Security” book series and six Australian Government Australian Institute of Criminology refereed monographs. He has been an invited speaker for a number of events (e.g. 2011 UNODC-ITU Asia-Pacific Regional Workshop on Fighting Cybercrime and 2011 KANZ Broadband Summit 2011), and delivered Keynote/Plenary Speeches at ECPAT Taiwan 2008 Conference on Criminal Problems and Intervention Strategy, 2010 International Conference on Applied Linguistics and 2011 Economic Crime Asia Conference, and Invited Lecture at the Bangladesh Institute of International and Strategic Studies. He was one of over 20 international (and one of two Australian) experts consulted by the research team preparing McAfee's commissioned report entitled 'Virtual Criminology Report 2009: Virtually Here: The Age of Cyber Warfare”; and his opinions on cyber crime and cyber security are regularly published in the media. In 2009, he was named one of 10 Emerging Leaders in the Innovation category of The Weekend Australian Magazine / Microsoft's Next 100 series. He is also the recipient of several awards including the 2010 Australian Capital Territory (ACT) Pearcey Award for 'Taking a risk and making a difference in the development of the Australian ICT industry”, 2008 Australia Day Achievement Medallion in recognition of my dedication and contribution to the Australian Institute of Criminology, and through it to the public service of the nation, British Computer Society's Wilkes Award for the best paper published in the 2007 volume of the Computer Journal, and the Best Student Paper Award by the 2005 Australasian Conference on Information Security and Privacy.

Choo / Ko The Cloud Security Ecosystem jetzt bestellen!

Autoren/Hrsg.


Weitere Infos & Material


About the Authors
Nurul Hidayah Ab Rahman is a Ph.D. Scholar at the University of South Australia, Australia. She received the B.Sc. (Hons.) degree from Universiti Teknologi MARA, Malaysia, and M.Sc. degree from Universiti Teknologi, Malaysia, in 2006 and 2010, respectively. Since 2011, she has been with the Information Security Department, University of Tun Hussein Onn, Malaysia, where she is currently an Academician. Her main areas of research interest are information security management and cloud computing security. Abdussalam Ali is a Ph.D. Scholar at the University of Technology, Sydney, Australia. He has a Bachelor degree in computer engineering and a Master’s degree in computer science. Vivek Agrawal is a Ph.D. Scholar at Gjøvik University College, Norway. He received the M.S. degree in information and communication systems security from Royal Institute of Technology, Sweden, in 2013. He is currently working toward the Ph.D. degree in migration of risk analysis tool to cloud at University College Gjøvik, Norway. His general interests are in the field of information security. His specific interests include software engineering, network security, secure cloud computing, risk analysis methods, and tools. Olaf Bergmann is a Lecturer in communication networks and Internet technology at Universität Bremen, Germany. He received his Doctorate in engineering (Dr.Ing.) in 2007 from Universität Bremen and holds a Master in commercial law since 2010. He has been involved in several national and international research projects in the areas of wireless and interpersonal multimedia communications. Olaf also has continuously participated in IETF standardization since 2000 and has coauthored several books on Web technologies. His current research focus is on architectures and communication protocols for constrained environments. Recently, he has initiated the open-source projects libcoap and tinydtls to leverage development of applications for the Internet of Things. Carsten Bormann, Honorarprofessor for Internet technology at the Universität Bremen, Germany, is a board member of its Center for Computing and Communications Technology (TZI). His research interests are in protocol design and system architectures for networking. In the IETF, he led a number of efforts on making IP networking work on unusual devices, including ROHC and 6LoWPAN. Most recently, he initiated the IETF work on Constrained RESTful Environments and the CoAP (Constrained Application) Protocol and is cochairing the IETF CoRE WG. He has authored and coauthored 29 Internet RFCs, which are in turn cited 211 times in other RFCs. Kim-Kwang Raymond Choo is a Fulbright Scholar and Senior Researcher at the University of South Australia, Australia. He is the coinventor of three provisional patents on digital forensics and mobile app security. His publications include a book published in Springer’s Advances in Information Security book series, and a book published by Syngress/Elsevier (Forewords written by Australia’s Chief Defence Scientist and Chair of the Electronic Evidence Specialist Advisory Group, Senior Managers of Australian and New Zealand Forensic Laboratories). He is currently the Editor of IEEE Cloud Computing Magazine’s “Cloud and the Law” column, coeditor for Syngress/Elsevier’s “Advanced Topics in Security, Privacy and Forensics” Book Series, and Research Director of Cloud Security Alliance Australia Chapter. He is also guest-editing an IEEE Cloud Computing Magazine Special Issue, IEEE Transactions on Cloud Computing Special Issue, Future Generation Computer Systems Special Issue, Journal of Computer and System Sciences Special Issue, Pervasive and Mobile Computing Special Issue, Digital Investigation Special Issue and ACM Transactions on Internet Technology Special Issue. In 2009, he was named one of 10 Emerging Leaders in the Innovation category of The Weekend Australian Magazine/Microsoft's Next 100 series. He is the recipient of the Highly Commended Award in the 2014 “Best Chapter in a Book” Category by Australia New Zealand Policing Advisory Agency (ANZPAA) National Institute of Forensic Science (NIFS), 2014 Academic Impact and Uptake Award (University of South Australia), 2010 Australian Capital Territory Pearcey Award, 2010 Consensus IT Professional Award, 2008 Australia Day Achievement Medallion, and the British Computer Society's Wilkes Award for the best (sole-authored) paper published in the 2007 volume of The Computer Journal. Ali Dehghantanha is a Cyber Security Researcher and Lecturer at University of Salford—Manchester, UK. He has served for several years in variety of industrial and academic positions with leading players in Cyber-Security and E-Commerce. He has long history of working in different areas of computer security as security researcher, malware analyzer, penetration tester, security consultant, professional trainer, and university lecturer. As a security researcher, Ali is actively researching on latest trends in “Real-Time Malware Detection and Analysis in Mobile and Pervasive Systems,” “0-Day Malware and Exploit Detection Techniques,” and “Big-Data Forensics”. He leads several academic research teams working on above-mentioned projects in University of Salford (UoS)—Greater Manchester. Baden Delamore is a Masters student at the University of Waikato undertaking research with the Cyber Security Researchers of Waikato (CROW). Recipient of the Waikato University Masters Research Scholarship, he holds a Bachelor of information technology, two Diploma's in information and communication technology and a Postgraduate Diploma in computer science. Prior to his research, Baden developed applications for numerous software projects (e.g. Waikato Institute of Technology Sports Science Department, Internet Marketing solutions) currently in production today. His main research interests are software engineering and cyber security, in particular, the application of offensive and defensive security techniques. His Master’s research thesis proposes an efficient and effect user-centric security assessment methodology of Web servers. He is a member of the IEEE. Quang Do is a Ph.D. Scholar at the University of South Australia, Australia, and holds a Bachelor of computer science (First Class Honors). He is the recipient of the prestigious University of South Australia Vice Chancellor and President’s Scholarship and is an active Android security researcher. Stefanie Gerdes is a Research Scientist in computer science at the AG Rechnernetze at Universität Bremen in Germany. Her research focuses on information security, in particular, on the specific challenges of securing smart objects in the Internet of Things. Currently, she participates in standardization efforts in the Internet Engineering Task Force (IETF) concerning authentication and authorization in constrained environments (ACE). William Bradley Glisson is currently an Associate Professor at the University of South Alabama, USA. He has a Ph.D. in computing science from the University of Glasgow, Scotland, 2008; Master of Science in information management from the University of Strathclyde, Scotland, 2001; Bachelor of Science in information systems & operations management from the University of North Carolina at Greensboro, 1999; and a Bachelor of Science in management from the University of North Carolina at Greensboro, 1993. Dr. Glisson has 10 years of industrial experience which includes working for U.S. and UK Global Fortune 500 financial institutions. Dr. Glisson has been the primary investigator on residual data research projects funded predominantly by industry. His area of research focuses on digital forensics, information assurance, software engineering, and applied computing science with a specific interest in the security and business implications of residual data. Previous to this appointment, he was the Director of the Computer Forensics M.Sc. program at the University of Glasgow for 5 years. He builds on previous administrative and teaching experiences to teach and improve digital forensic courses while researching relevant real-world digital forensic issues at the University of South Alabama. George Grispos is a Doctoral Researcher at the University of Glasgow, Scotland. He is currently completing a Ph.D. in computing science which focuses on the business implications of information security incidents along with the subsequent management and handling of such incidents. Previously, George completed a Master of Science (M.Sc.) in computer forensics and e-discovery from the University of Glasgow, and a Bachelor of Science (B.Sc. Hons.) in computer networks from Middlesex University in London. In addition to security incident response, his research interests include: digital forensics, information security management, as well as examining the managerial and technical issues surrounding secure cloud computing services within organizations. Sheikh Mahbub Habib is a Postdoctoral researcher at the Telecooperation Lab. and Coordinator of CASED Secure Services research area in Germany. Additionally, he is leading the Smart Security & Trust area as a part of the Telecooperation Lab. since September 2013. Sheikh obtained his doctoral degree from Technische Universität Darmstadt in 2013 for his work on computational trust mechanisms with focus on distributed service environments. His current...



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.