Front Cover._x000D_
Title Page._x000D_
Copyright Page._x000D_
Advances in Information Security, Privacy, and Ethics (AISPE) Book Series._x000D_
Titles in this Series._x000D_
Dedication._x000D_
Editorial Advisory Board._x000D_
List of Reviewers._x000D_
Table of Contents._x000D_
Detailed Table of Contents._x000D_
Foreword._x000D_
Preface._x000D_
Acknowledgment._x000D_
Privacy, Anonymity, and Trust Management._x000D_
1: Diversity in Security Environments: The Why and the Wherefore._x000D_
2: Foreground Trust as a Security Paradigm: Turning Users into Strong Links._x000D_
3: A State-of-the-Art Review of Data Stream Anonymization Schemes._x000D_
4: Is It Privacy or Is It Access Control?._x000D_
5: Design of an IPTV Conditional Access System Supporting Multiple-Services._x000D_
Cyber-Defense Challenges._x000D_
6: Standing Your Ground: Current and Future Challenges in Cyber Defense._x000D_
7: Necessary Standard for Providing Privacy and Security in IPv6 Networks._x000D_
8: A Security Analysis of MPLS Service Degradation Attacks Based on Restricted Adversary Models._x000D_
9: The Future of National and International Security on the Internet._x000D_
Forensics, Malware Detection, and Analysis._x000D_
10: Similarity Measure for Obfuscated Malware Analysis._x000D_
11: Mobile Worms and Viruses._x000D_
12: On Complex Crimes and Digital Forensics._x000D_
13: Transform Domain Techniques for Image Steganography._x000D_
Cloud Security._x000D_
14: Experiences with Threat Modeling on a Prototype Social Network._x000D_
15: Solving Security and Availability Challenges in Public Clouds._x000D_
16: Information Security Innovation: Personalisation of Security Services in a Mobile Cloud Infrastructure._x000D_
Concluding Thoughts on Information Security in Diverse Computing Environments._x000D_
Compilation of References._x000D_
About the Contributors._x000D_
Index._x000D_