E-Book, Englisch, 487 Seiten, eBook
Reihe: Security and Cryptology
Samarati / Ray From Database to Cyber Security
Erscheinungsjahr 2018
ISBN: 978-3-030-04834-1
Verlag: Springer International Publishing
Format: PDF
Kopierschutz: 1 - PDF Watermark
Essays Dedicated to Sushil Jajodia on the Occasion of His 70th Birthday
E-Book, Englisch, 487 Seiten, eBook
Reihe: Security and Cryptology
ISBN: 978-3-030-04834-1
Verlag: Springer International Publishing
Format: PDF
Kopierschutz: 1 - PDF Watermark
Zielgruppe
Research
Autoren/Hrsg.
Weitere Infos & Material
From Cyber Situational Awareness to Adaptive Cyber Defense: Leveling the Cyber Playing Field.- Policy Engineering in RBAC and ABAC.- Comprehensive Security Assurance Measures for Virtualized Server Environments.- Stratification Based Model for Security Policy with Exceptions and Contraries to Duty.- Asymptotic Behavior of Attack Graph Games.- Some Ideas on Privacy-Aware Data Analytics in the Internet-of-Everything.- Protecting Resources and Regulating Access in Cloud-based Object Storage.- Function-Based Access Control (FBAC): Towards Preventing Insider Threats in Organizations.- Virtualization Technologies and Cloud Security: Advantages, Issues, and Perspectives.- Access Privacy in the Cloud.- A Strategy for Effective Alert Analysis at a Cyber Security Operations Center.- Retrieval of Relevant Historical Data Triage Operations in Security Operation Centers.- Supporting Users in Cloud Plan Selection.- Distributed Services Attestation in IoT.- Exploiting Data Sensitivity on PartitionedData.- A Review of Graph Approaches to Network Security Analytics.- Advanced Biometric Technologies: Emerging Scenarios and Research Trends.- Attribute-Based Encryption: Applications and Future Directions.- Static Analysis for Security Vetting of Android Apps.- Breaking Bad: Forecasting Adversarial Android Bad Behavior.- Bot or Human? A Behavior-based Online Bot Detection System.- Network Security Metrics: From Known Vulnerabilities to Zero Day Attacks.- Theoretical Foundations for Mobile Target Defense: Proactive Secret Sharing and Secure Multiparty Computation.