رکورد قبلیرکورد بعدی

" Handbook of computer networks and cyber security "


Document Type : BL
Record Number : 862402
Title & Author : Handbook of computer networks and cyber security : principles and paradigms /\ Brij B. Gupta, Gregorio Martinez Perez, Dharma P. Agrawal, Deepak Gupta, editors.
Publication Statement : Cham :: Springer,, 2020.
Page. NO : 1 online resource (957 p.)
ISBN : 3030222772
: : 9783030222772
: 3030222764
: 9783030222765
Notes : 6.2 Authentication Service
: Description based upon print version of record.
Contents : Intro -- Preface -- Acknowledgment -- Contents -- About the Editors -- 1 Security Frameworks in Mobile Cloud Computing -- 1 Introduction -- 2 Architecture of Mobile Cloud Computing -- 3 Security Aspects of Mobile Cloud Computing -- 4 Security Frameworks for Mobile Cloud Computing -- 4.1 Authentication Frameworks for Mobile Cloud Computing -- 4.2 Privacy Preserving Security Frameworks for MCC -- 4.3 Secure Data Storage Frameworks for MCC -- 4.4 Security Frameworks for Computation Using MCC -- 5 Attack, Risk Assessment, and Verifiability in Mobile Clouds -- 6 Summary and Discussion
: 2.2 Mean Failure Cost Model (MFC): A Quantitative Cybersecurity Risk Assessment Model -- 2.3 Mean Failure Cost (MFC) Limits -- 3 Cloud Computing Environments -- 3.1 Cloud Computing Architecture -- 3.2 Cloud Computing Security Issues -- 4 MFCext and MFCint: New Quantitative Security Risk Assessment Models -- 4.1 Security Threat Space Intrusion -- 4.1.1 Internal Threats -- 4.1.2 External Threats -- 4.1.3 Internal/External Threats -- 4.2 MFCext and MFCint: The Proposed Model -- 4.3 Illustration of the Cybersecurity Model: A Cloud Computing System -- 4.4 Validation of the MFCint and the MFCext
: 4.1 Smart-Model: System Architecture -- 4.2 Component Views -- 4.3 Flow of Information Management -- 5 Security Solutions for Smart Model -- 5.1 Model Description -- 5.2 Key Generation -- 5.2.1 Encryption to Top Cloud -- 5.2.2 Encryption to IS -- 5.2.3 Proxy Re-encryption -- 5.2.4 Signature Generation by Top Cloud -- 5.2.5 Signature Generation in Regional Cloud -- 5.2.6 Signature Generation by End-Users -- 6 Schemes for Secure Framework -- 6.1 Confidentiality -- 6.1.1 Encryption to Top Cloud -- 6.1.2 Encryption to Information Storage -- 6.1.3 Proxy Re-encryption to Information Storage
: 4.5 MFCext and MFCint Limits and Advantages -- 5 The MFC Extension Model (MFCE) -- 5.1 The MFCE Model -- 5.2 Illustration of the MFC Extension Model: Cloud Computing System -- 5.2.1 The Impact Threats Classes Matrix -- 5.2.2 The Threat Classes Matrix -- 5.3 Validation of the MFCE Model -- 6 Conclusion -- References -- 4 A Novel AckIBE-Based Secure Cloud Data Management Framework -- 1 Introduction -- 1.1 Support of Cloud Computing -- 2 Related Literature -- 2.1 Security Approaches of Smart Model -- 3 Basic IB Schemes -- 3.1 Other IB Schemes -- 4 Secure Smart Model
: 7 Conclusion -- References -- 2 An Investigation Study of Privacy Preserving in Cloud Computing Environment -- 1 Introduction -- 2 Privacy-Preserving Methods -- 3 Searchable Encryption-Based Techniques -- 3.1 Symmetric-Key Based Techniques -- 3.2 Fuzzy-Searchable Encryption -- 3.3 Public-Key Encryption -- 4 Conclusion and Future Work -- References -- 3 Towards New Quantitative Cybersecurity Risk Analysis Models for Information Systems: A Cloud ComputingCase Study -- 1 Introduction -- 2 Motivation: Quantitative Cybersecurity Risk Assessment Models -- 2.1 Related Work
Abstract : This handbook introduces the basic principles and fundamentals of cyber security towards establishing an understanding of how to protect computers from hackers and adversaries. The highly informative subject matter of this handbook, includes various concepts, models, and terminologies along with examples and illustrations to demonstrate substantial technical details of the field. It motivates the readers to exercise better protection and defense mechanisms to deal with attackers and mitigate the situation. This handbook also outlines some of the exciting areas of future research where the existing approaches can be implemented. Exponential increase in the use of computers as a means of storing and retrieving security-intensive information, requires placement of adequate security measures to safeguard the entire computing and communication scenario. With the advent of Internet and its underlying technologies, information security aspects are becoming a prime concern towards protecting the networks and the cyber ecosystem from variety of threats, which is illustrated in this handbook. This handbook primarily targets professionals in security, privacy and trust to use and improve the reliability of businesses in a distributed manner, as well as computer scientists and software developers, who are seeking to carry out research and develop software in information and cyber security. Researchers and advanced-level students in computer science will also benefit from this reference.
Subject : Computer networks, Handbooks, manuals, etc.
Subject : Computer security, Handbooks, manuals, etc.
Subject : Computer networks.
Subject : Computer security.
Dewey Classification : ‭004.6‬
LC Classification : ‭TK5105.5‬
Added Entry : Agrawal, Dharma P., (Dharma Prakash),1945-
: Gupta, Brij,1982-
: Gupta, Deepak,1983-
: Martinez Pérez, Gregorio.
کپی لینک

پیشنهاد خرید
پیوستها
Search result is zero
نظرسنجی
نظرسنجی منابع دیجیتال

1 - آیا از کیفیت منابع دیجیتال راضی هستید؟