Information Security in Diverse Computing Environments

Information Security in Diverse Computing Environments

Anne Kayem (Department of Computer Science, University of Cape Town, South Africa) and Christoph Meinel (Hasso-Plattner-Institute for IT Systems Engineering, University of Potsdam, Potsdam, Germany)
Indexed In: SCOPUS
Release Date: June, 2014|Copyright: © 2014 |Pages: 354
DOI: 10.4018/978-1-4666-6158-5
ISBN13: 9781466661585|ISBN10: 1466661585|EISBN13: 9781466661592
Hardcover:
Available
$245.00
TOTAL SAVINGS: $245.00
Benefits
  • Free shipping on orders $395+
  • Printed-On-Demand (POD)
  • Usually ships one day from order
  • 20% discount on 5+ titles*
E-Book:
(Multi-User License)
Available
$220.50
List Price: $245.00
10% Discount:-$24.50
TOTAL SAVINGS: $24.50
Benefits
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • ePub with PDF download
  • 20% discount on 5+ titles*
Hardcover +
E-Book:
(Multi-User License)
Available
$295.00
TOTAL SAVINGS: $295.00
Benefits
  • Free shipping on orders $395+
  • Printed-On-Demand (POD)
  • Usually ships one day from order
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • ePub with PDF download
  • 20% discount on 5+ titles*
OnDemand:
(Individual Chapters)
Available
$37.50
TOTAL SAVINGS: $37.50
Benefits
  • Purchase individual chapters from this book
  • Immediate PDF download after purchase or access through your personal library
  • 20% discount on 5+ titles*
Description & Coverage
Description:

Information security systems have become more popular due to the prevalence of criminal activity over benign attacks. Because computer systems are constantly changing, it is important to explore new security measures and unconventional approaches to solving issues.

Information Security in Diverse Computing Environments provides the latest empirical research and theoretical frameworks in the area of information security. This reference book presents research on developing sufficient security measures for new environments by discussing challenges faced by researchers as well as unconventional solutions to these problems. This book will be useful for academics, students, professionals, executives, and researchers who want to improve their understanding of the role of information security at different levels of the knowledge society.

Coverage:

The many academic areas covered in this publication include, but are not limited to:

  • Access Control
  • Anonymization and Authentication
  • Cloud Security
  • Formal Methods of Verification
  • Information security
  • Mobile Viruses and Worms
  • Network security
  • Secure Mobile Platforms
  • Unconventional Security Solutions
Indices
Reviews and Testimonials

Sixteen papers assess the security challenges created by increasingly complex computer systems and interconnected networks, and propose a statistical malware scanner, an IPTV conditional access system, a data distribution systems for cloud storage providers, and personalization of security services for mobile devices. Other contributions review penetration testing tools, rules for designing security applications, data stream anonymization schemes, transform domain techniques for image steganography, and decision problems for guiding the construction of digital forensic tools.

– ProtoView Book Abstracts (formerly Book News, Inc.)
Table of Contents
Search this Book:
Reset
Editor Biographies
Anne V.D.M. Kayem is currently a Senior Lecturer at the University of Cape Town's Department of Computer Science and head of the Information Security Laboratory. Since January 2013, she is speaker of the Hasso-Plattner-Institute's PhD Research School in Information and Communication Technologies for Development at the University of Cape Town, South Africa. She holds a PhD degree in Computer Science obtained from Queen's University, Kingston, Ontario, Canada. Her PhD thesis was on Adaptive Cryptographic Access Control in Dynamic Data Sharing Environments and her current research interests lie in the areas of Cryptographic Key Management, Data Anonymization, Autonomic Computing, Access Control, and Unconventional Security Methodologies for resource constrained environments. She is a member of ACM and IEEE, and a member of the editorial board of Parallel Processing Letters. In addition, she is on the reviewing board of a couple of local (South African) and international conferences and journals. She co-chairs the INTRICATE-SEC (Theories and Intricacies of Information Security Problems) workshop which holds annually in conjunction with the ISSA (Information Security South Africa) conference in Johannesburg, South Africa.
Christoph Meinel is a professor and director at the Hasso-Plattner-Institut at the University of Potsdam, where he leads the Internet Technologies and Systems research group. His research interests include security and trust engineering, Web 3.0, and eLearning. Meinel has a PhD in computer science from the Humboldt-University in Berlin.
Peer Review Process
The peer review process is the driving force behind all IGI Global books and journals. All IGI Global reviewers maintain the highest ethical standards and each manuscript undergoes a rigorous double-blind peer review process, which is backed by our full membership to the Committee on Publication Ethics (COPE). Learn More >
Ethics & Malpractice
IGI Global book and journal editors and authors are provided written guidelines and checklists that must be followed to maintain the high value that IGI Global places on the work it publishes. As a full member of the Committee on Publication Ethics (COPE), all editors, authors and reviewers must adhere to specific ethical and quality standards, which includes IGI Global’s full ethics and malpractice guidelines and editorial policies. These apply to all books, journals, chapters, and articles submitted and accepted for publication. To review our full policies, conflict of interest statement, and post-publication corrections, view IGI Global’s Full Ethics and Malpractice Statement.