From database to cyber security : essays dedicated to Sushil Jajodia on the occasion of his 70th birthday /: essays dedicated to Sushil Jajodia on the occasion of his 70th birthday. (2018)
- Record Type:
- Book
- Title:
- From database to cyber security : essays dedicated to Sushil Jajodia on the occasion of his 70th birthday /: essays dedicated to Sushil Jajodia on the occasion of his 70th birthday. (2018)
- Main Title:
- From database to cyber security : essays dedicated to Sushil Jajodia on the occasion of his 70th birthday
- Further Information:
- Note: Pierangela Samarati, Indrajit Ray, Indrakshi Ray (eds.).
- Editors:
- Samarati, Pierangela
(Computer scientist), Ray, Indrajit
Ray, Indrakshi - Other Names:
- Jajodia, Sushil honouree.
- Contents:
- From Cyber Situational Awareness to Adaptive Cyber Defense: Leveling the Cyber Playing Field -- Policy Engineering in RBAC and ABAC -- Comprehensive Security Assurance Measures for Virtualized Server Environments -- Stratification Based Model for Security Policy with Exceptions and Contraries to Duty -- Asymptotic Behavior of Attack Graph Games -- Some Ideas on Privacy-Aware Data Analytics in the Internet-of-Everything -- Protecting Resources and Regulating Access in Cloud-based Object Storage -- Function-Based Access Control (FBAC): Towards Preventing Insider Threats in Organizations -- Virtualization Technologies and Cloud Security: Advantages, Issues, and Perspectives -- Access Privacy in the Cloud -- A Strategy for Effective Alert Analysis at a Cyber Security Operations Center -- Retrieval of Relevant Historical Data Triage Operations in Security Operation Centers -- Supporting Users in Cloud Plan Selection -- Distributed Services Attestation in IoT -- Exploiting Data Sensitivity on Partitioned Data -- A Review of Graph Approaches to Network Security Analytics -- Advanced Biometric Technologies: Emerging Scenarios and Research Trends -- Attribute-Based Encryption: Applications and Future Directions -- Static Analysis for Security Vetting of Android Apps -- Breaking Bad: Forecasting Adversarial Android Bad Behavior -- Bot or Human? A Behavior-based Online Bot Detection System -- Network Security Metrics: From Known Vulnerabilities to Zero Day Attacks -- TheoreticalFrom Cyber Situational Awareness to Adaptive Cyber Defense: Leveling the Cyber Playing Field -- Policy Engineering in RBAC and ABAC -- Comprehensive Security Assurance Measures for Virtualized Server Environments -- Stratification Based Model for Security Policy with Exceptions and Contraries to Duty -- Asymptotic Behavior of Attack Graph Games -- Some Ideas on Privacy-Aware Data Analytics in the Internet-of-Everything -- Protecting Resources and Regulating Access in Cloud-based Object Storage -- Function-Based Access Control (FBAC): Towards Preventing Insider Threats in Organizations -- Virtualization Technologies and Cloud Security: Advantages, Issues, and Perspectives -- Access Privacy in the Cloud -- A Strategy for Effective Alert Analysis at a Cyber Security Operations Center -- Retrieval of Relevant Historical Data Triage Operations in Security Operation Centers -- Supporting Users in Cloud Plan Selection -- Distributed Services Attestation in IoT -- Exploiting Data Sensitivity on Partitioned Data -- A Review of Graph Approaches to Network Security Analytics -- Advanced Biometric Technologies: Emerging Scenarios and Research Trends -- Attribute-Based Encryption: Applications and Future Directions -- Static Analysis for Security Vetting of Android Apps -- Breaking Bad: Forecasting Adversarial Android Bad Behavior -- Bot or Human? A Behavior-based Online Bot Detection System -- Network Security Metrics: From Known Vulnerabilities to Zero Day Attacks -- Theoretical Foundations for Mobile Target Defense: Proactive Secret Sharing and Secure Multiparty Computation. . … (more)
- Publisher Details:
- Cham, Switzerland : Springer
- Publication Date:
- 2018
- Extent:
- 1 online resource (xii, 487 pages), illustrations (some color)
- Subjects:
- 005.8
Computer security
Databases
Systems and Data Security
Cryptology
Computer Communication Networks
Computers and Society
Information Systems Applications (incl. Internet)
Electronic books - Languages:
- English
- ISBNs:
- 9783030048341
3030048349 - Related ISBNs:
- 9783030048334
- Notes:
- Note: Online resource; title from PDF title page (SpringerLink, viewed December 10, 2018).
- Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.378845
- Ingest File:
- 02_361.xml