Brij B. Gupta, Gregorio Martinez Perez, Dharma P. Agrawal, Deepak Gupta, editors.
وضعیت نشر و پخش و غیره
محل نشرو پخش و غیره
Cham :
نام ناشر، پخش کننده و غيره
Springer,
تاریخ نشرو بخش و غیره
2020.
مشخصات ظاهری
نام خاص و کميت اثر
1 online resource (957 p.)
يادداشت کلی
متن يادداشت
6.2 Authentication Service
متن يادداشت
Description based upon print version of record.
یادداشتهای مربوط به مندرجات
متن يادداشت
Intro -- Preface -- Acknowledgment -- Contents -- About the Editors -- 1 Security Frameworks in Mobile Cloud Computing -- 1 Introduction -- 2 Architecture of Mobile Cloud Computing -- 3 Security Aspects of Mobile Cloud Computing -- 4 Security Frameworks for Mobile Cloud Computing -- 4.1 Authentication Frameworks for Mobile Cloud Computing -- 4.2 Privacy Preserving Security Frameworks for MCC -- 4.3 Secure Data Storage Frameworks for MCC -- 4.4 Security Frameworks for Computation Using MCC -- 5 Attack, Risk Assessment, and Verifiability in Mobile Clouds -- 6 Summary and Discussion
متن يادداشت
2.2 Mean Failure Cost Model (MFC): A Quantitative Cybersecurity Risk Assessment Model -- 2.3 Mean Failure Cost (MFC) Limits -- 3 Cloud Computing Environments -- 3.1 Cloud Computing Architecture -- 3.2 Cloud Computing Security Issues -- 4 MFCext and MFCint: New Quantitative Security Risk Assessment Models -- 4.1 Security Threat Space Intrusion -- 4.1.1 Internal Threats -- 4.1.2 External Threats -- 4.1.3 Internal/External Threats -- 4.2 MFCext and MFCint: The Proposed Model -- 4.3 Illustration of the Cybersecurity Model: A Cloud Computing System -- 4.4 Validation of the MFCint and the MFCext
متن يادداشت
4.1 Smart-Model: System Architecture -- 4.2 Component Views -- 4.3 Flow of Information Management -- 5 Security Solutions for Smart Model -- 5.1 Model Description -- 5.2 Key Generation -- 5.2.1 Encryption to Top Cloud -- 5.2.2 Encryption to IS -- 5.2.3 Proxy Re-encryption -- 5.2.4 Signature Generation by Top Cloud -- 5.2.5 Signature Generation in Regional Cloud -- 5.2.6 Signature Generation by End-Users -- 6 Schemes for Secure Framework -- 6.1 Confidentiality -- 6.1.1 Encryption to Top Cloud -- 6.1.2 Encryption to Information Storage -- 6.1.3 Proxy Re-encryption to Information Storage
متن يادداشت
4.5 MFCext and MFCint Limits and Advantages -- 5 The MFC Extension Model (MFCE) -- 5.1 The MFCE Model -- 5.2 Illustration of the MFC Extension Model: Cloud Computing System -- 5.2.1 The Impact Threats Classes Matrix -- 5.2.2 The Threat Classes Matrix -- 5.3 Validation of the MFCE Model -- 6 Conclusion -- References -- 4 A Novel AckIBE-Based Secure Cloud Data Management Framework -- 1 Introduction -- 1.1 Support of Cloud Computing -- 2 Related Literature -- 2.1 Security Approaches of Smart Model -- 3 Basic IB Schemes -- 3.1 Other IB Schemes -- 4 Secure Smart Model
متن يادداشت
7 Conclusion -- References -- 2 An Investigation Study of Privacy Preserving in Cloud Computing Environment -- 1 Introduction -- 2 Privacy-Preserving Methods -- 3 Searchable Encryption-Based Techniques -- 3.1 Symmetric-Key Based Techniques -- 3.2 Fuzzy-Searchable Encryption -- 3.3 Public-Key Encryption -- 4 Conclusion and Future Work -- References -- 3 Towards New Quantitative Cybersecurity Risk Analysis Models for Information Systems: A Cloud ComputingCase Study -- 1 Introduction -- 2 Motivation: Quantitative Cybersecurity Risk Assessment Models -- 2.1 Related Work
بدون عنوان
0
بدون عنوان
8
بدون عنوان
8
بدون عنوان
8
بدون عنوان
8
یادداشتهای مربوط به خلاصه یا چکیده
متن يادداشت
This handbook introduces the basic principles and fundamentals of cyber security towards establishing an understanding of how to protect computers from hackers and adversaries. The highly informative subject matter of this handbook, includes various concepts, models, and terminologies along with examples and illustrations to demonstrate substantial technical details of the field. It motivates the readers to exercise better protection and defense mechanisms to deal with attackers and mitigate the situation. This handbook also outlines some of the exciting areas of future research where the existing approaches can be implemented. Exponential increase in the use of computers as a means of storing and retrieving security-intensive information, requires placement of adequate security measures to safeguard the entire computing and communication scenario. With the advent of Internet and its underlying technologies, information security aspects are becoming a prime concern towards protecting the networks and the cyber ecosystem from variety of threats, which is illustrated in this handbook. This handbook primarily targets professionals in security, privacy and trust to use and improve the reliability of businesses in a distributed manner, as well as computer scientists and software developers, who are seeking to carry out research and develop software in information and cyber security. Researchers and advanced-level students in computer science will also benefit from this reference.
یادداشتهای مربوط به سفارشات
منبع سفارش / آدرس اشتراک
Springer Nature
شماره انبار
com.springer.onix.9783030222772
ویراست دیگر از اثر در قالب دیگر رسانه
عنوان
Handbook of Computer Networks and Cyber Security : Principles and Paradigms