Information Security in Diverse Computing Environments

Information Security in Diverse Computing Environments

Anne Kayem (Department of Computer Science, University of Cape Town, South Africa) and Christoph Meinel (Hasso-Plattner-Institute for IT Systems Engineering, University of Potsdam, Potsdam, Germany)
Indexed In: SCOPUS
Release Date: June, 2014|Copyright: © 2014 |Pages: 354
ISBN13: 9781466661585|ISBN10: 1466661585|EISBN13: 9781466661592|DOI: 10.4018/978-1-4666-6158-5

Description

Information security systems have become more popular due to the prevalence of criminal activity over benign attacks. Because computer systems are constantly changing, it is important to explore new security measures and unconventional approaches to solving issues.

Information Security in Diverse Computing Environments provides the latest empirical research and theoretical frameworks in the area of information security. This reference book presents research on developing sufficient security measures for new environments by discussing challenges faced by researchers as well as unconventional solutions to these problems. This book will be useful for academics, students, professionals, executives, and researchers who want to improve their understanding of the role of information security at different levels of the knowledge society.

Topics Covered

The many academic areas covered in this publication include, but are not limited to:

  • Access Control
  • Anonymization and Authentication
  • Cloud Security
  • Formal Methods of Verification
  • Information security
  • Mobile Viruses and Worms
  • Network Security
  • Secure Mobile Platforms
  • Unconventional Security Solutions

Reviews and Testimonials

Sixteen papers assess the security challenges created by increasingly complex computer systems and interconnected networks, and propose a statistical malware scanner, an IPTV conditional access system, a data distribution systems for cloud storage providers, and personalization of security services for mobile devices. Other contributions review penetration testing tools, rules for designing security applications, data stream anonymization schemes, transform domain techniques for image steganography, and decision problems for guiding the construction of digital forensic tools.

– ProtoView Book Abstracts (formerly Book News, Inc.)

Table of Contents and List of Contributors

Search this Book:
Reset

Author(s)/Editor(s) Biography

Anne V.D.M. Kayem is currently a Senior Lecturer at the University of Cape Town's Department of Computer Science and head of the Information Security Laboratory. Since January 2013, she is speaker of the Hasso-Plattner-Institute's PhD Research School in Information and Communication Technologies for Development at the University of Cape Town, South Africa. She holds a PhD degree in Computer Science obtained from Queen's University, Kingston, Ontario, Canada. Her PhD thesis was on Adaptive Cryptographic Access Control in Dynamic Data Sharing Environments and her current research interests lie in the areas of Cryptographic Key Management, Data Anonymization, Autonomic Computing, Access Control, and Unconventional Security Methodologies for resource constrained environments. She is a member of ACM and IEEE, and a member of the editorial board of Parallel Processing Letters. In addition, she is on the reviewing board of a couple of local (South African) and international conferences and journals. She co-chairs the INTRICATE-SEC (Theories and Intricacies of Information Security Problems) workshop which holds annually in conjunction with the ISSA (Information Security South Africa) conference in Johannesburg, South Africa.
Christoph Meinel is a professor and director at the Hasso-Plattner-Institut at the University of Potsdam, where he leads the Internet Technologies and Systems research group. His research interests include security and trust engineering, Web 3.0, and eLearning. Meinel has a PhD in computer science from the Humboldt-University in Berlin.

Indices