Information Security in Diverse Computing Environments

Information Security in Diverse Computing Environments

Indexed In: SCOPUS
Release Date: June, 2014|Copyright: © 2014 |Pages: 354
DOI: 10.4018/978-1-4666-6158-5
ISBN13: 9781466661585|ISBN10: 1466661585|EISBN13: 9781466661592
Hardcover:
Available
$245.00
TOTAL SAVINGS: $245.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
Hardcover:
Available
$245.00
TOTAL SAVINGS: $245.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
E-Book:
Available
$245.00
TOTAL SAVINGS: $245.00
Benefits
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • PDF download
E-Book:
Available
$245.00
TOTAL SAVINGS: $245.00
Benefits
  • Immediate access after purchase
  • No DRM
  • PDF download
  • Receive a 10% Discount on eBooks
Hardcover +
E-Book:
Available
$295.00
TOTAL SAVINGS: $295.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • PDF download
Hardcover +
E-Book:
Available
$295.00
TOTAL SAVINGS: $295.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
  • Immediate access after purchase
  • No DRM
  • PDF download
Article Processing Charge:
Available
$700.00
TOTAL SAVINGS: $700.00
OnDemand:
(Individual Chapters)
Available
$37.50
TOTAL SAVINGS: $37.50
Benefits
  • Purchase individual chapters from this book
  • Immediate PDF download after purchase or access through your personal library
Description & Coverage
Description:

Information security systems have become more popular due to the prevalence of criminal activity over benign attacks. Because computer systems are constantly changing, it is important to explore new security measures and unconventional approaches to solving issues.

Information Security in Diverse Computing Environments provides the latest empirical research and theoretical frameworks in the area of information security. This reference book presents research on developing sufficient security measures for new environments by discussing challenges faced by researchers as well as unconventional solutions to these problems. This book will be useful for academics, students, professionals, executives, and researchers who want to improve their understanding of the role of information security at different levels of the knowledge society.

Coverage:

The many academic areas covered in this publication include, but are not limited to:

  • Access Control
  • Anonymization and Authentication
  • Cloud Security
  • Formal Methods of Verification
  • Information Security
  • Mobile Viruses and Worms
  • Network Security
  • Secure Mobile Platforms
  • Unconventional Security Solutions
Reviews & Statements

Sixteen papers assess the security challenges created by increasingly complex computer systems and interconnected networks, and propose a statistical malware scanner, an IPTV conditional access system, a data distribution systems for cloud storage providers, and personalization of security services for mobile devices. Other contributions review penetration testing tools, rules for designing security applications, data stream anonymization schemes, transform domain techniques for image steganography, and decision problems for guiding the construction of digital forensic tools.

– ProtoView Book Abstracts (formerly Book News, Inc.)
Table of Contents
Search this Book:
Reset
Editor/Author Biographies
Anne V.D.M. Kayem is currently a Senior Lecturer at the University of Cape Town's Department of Computer Science and head of the Information Security Laboratory. Since January 2013, she is speaker of the Hasso-Plattner-Institute's PhD Research School in Information and Communication Technologies for Development at the University of Cape Town, South Africa. She holds a PhD degree in Computer Science obtained from Queen's University, Kingston, Ontario, Canada. Her PhD thesis was on Adaptive Cryptographic Access Control in Dynamic Data Sharing Environments and her current research interests lie in the areas of Cryptographic Key Management, Data Anonymization, Autonomic Computing, Access Control, and Unconventional Security Methodologies for resource constrained environments. She is a member of ACM and IEEE, and a member of the editorial board of Parallel Processing Letters. In addition, she is on the reviewing board of a couple of local (South African) and international conferences and journals. She co-chairs the INTRICATE-SEC (Theories and Intricacies of Information Security Problems) workshop which holds annually in conjunction with the ISSA (Information Security South Africa) conference in Johannesburg, South Africa.
Christoph Meinel is a professor and director at the Hasso-Plattner-Institut at the University of Potsdam, where he leads the Internet Technologies and Systems research group. His research interests include security and trust engineering, Web 3.0, and eLearning. Meinel has a PhD in computer science from the Humboldt-University in Berlin.
Abstracting & Indexing
Archiving
All of IGI Global's content is archived via the CLOCKSS and LOCKSS initiative. Additionally, all IGI Global published content is available in IGI Global's InfoSci® platform.