Information Security in Diverse Computing Environments, 1st Edition

  • Anne Kayem
  • Published By:
  • ISBN-10: 1466661593
  • ISBN-13: 9781466661592
  • DDC: 005.8
  • Grade Level Range: College Freshman - College Senior
  • 300 Pages | eBook
  • Original Copyright 2014 | Published/Released December 2015
  • This publication's content originally published in print form: 2014

  • Price:  Sign in for price



Information security systems have become more popular due to the prevalence of criminal activity over benign attacks. Because computer systems are constantly changing, it is important to explore new security measures and unconventional approaches to solving issues. Information Security in Diverse Computing Environments provides the latest empirical research and theoretical frameworks in the area of information security. This reference book presents research on developing sufficient security measures for new environments by discussing challenges faced by researchers as well as unconventional solutions to these problems. This book will be useful for academics, students, professionals, executives, and researchers who want to improve their understanding of the role of information security at different levels of the knowledge society..

Table of Contents

Front Cover._x000D_
Title Page._x000D_
Copyright Page._x000D_
Advances in Information Security, Privacy, and Ethics (AISPE) Book Series._x000D_
Titles in this Series._x000D_
Editorial Advisory Board._x000D_
List of Reviewers._x000D_
Table of Contents._x000D_
Detailed Table of Contents._x000D_
Privacy, Anonymity, and Trust Management._x000D_
1: Diversity in Security Environments: The Why and the Wherefore._x000D_
2: Foreground Trust as a Security Paradigm: Turning Users into Strong Links._x000D_
3: A State-of-the-Art Review of Data Stream Anonymization Schemes._x000D_
4: Is It Privacy or Is It Access Control?._x000D_
5: Design of an IPTV Conditional Access System Supporting Multiple-Services._x000D_
Cyber-Defense Challenges._x000D_
6: Standing Your Ground: Current and Future Challenges in Cyber Defense._x000D_
7: Necessary Standard for Providing Privacy and Security in IPv6 Networks._x000D_
8: A Security Analysis of MPLS Service Degradation Attacks Based on Restricted Adversary Models._x000D_
9: The Future of National and International Security on the Internet._x000D_
Forensics, Malware Detection, and Analysis._x000D_
10: Similarity Measure for Obfuscated Malware Analysis._x000D_
11: Mobile Worms and Viruses._x000D_
12: On Complex Crimes and Digital Forensics._x000D_
13: Transform Domain Techniques for Image Steganography._x000D_
Cloud Security._x000D_
14: Experiences with Threat Modeling on a Prototype Social Network._x000D_
15: Solving Security and Availability Challenges in Public Clouds._x000D_
16: Information Security Innovation: Personalisation of Security Services in a Mobile Cloud Infrastructure._x000D_
Concluding Thoughts on Information Security in Diverse Computing Environments._x000D_
Compilation of References._x000D_
About the Contributors._x000D_