Optimizing information security and advancing privacy assurance: new technologies
"This book reviews issues and trends in security and privacy at an individual user level, as well as within global enterprises, covering enforcement of existing security technologies, factors driving their use, and goals for ensuring the continued security of information systems" - Provide...
Gespeichert in:
Weitere Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey PA
Information Science Reference
[2012]
|
Schriftenreihe: | Premier reference source
|
Schlagworte: | |
Online-Zugang: | DE-706 DE-1049 DE-898 DE-1050 DE-83 Volltext |
Zusammenfassung: | "This book reviews issues and trends in security and privacy at an individual user level, as well as within global enterprises, covering enforcement of existing security technologies, factors driving their use, and goals for ensuring the continued security of information systems" - Provided by publisher |
Beschreibung: | Includes bibliographical references |
Beschreibung: | 1 Online-Ressource (xiv, 324 Seiten) |
ISBN: | 9781466600270 9781466600287 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV044447551 | ||
003 | DE-604 | ||
005 | 20171201 | ||
007 | cr|uuu---uuuuu | ||
008 | 170811s2012 |||| o||u| ||||||eng d | ||
020 | |a 9781466600270 |9 978-1-4666-0027-0 | ||
020 | |a 9781466600287 |c print & perpetual access |9 978-1-4666-0028-7 | ||
024 | 7 | |a 10.4018/978-1-4666-0026-3 |2 doi | |
035 | |a (OCoLC)1002269710 | ||
035 | |a (DE-599)BVBBV044447551 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-706 |a DE-1049 |a DE-898 |a DE-1050 |a DE-83 | ||
245 | 1 | 0 | |a Optimizing information security and advancing privacy assurance |b new technologies |c Hamid R. Nemati (University of North Carolina at Greensboro, USA) |
264 | 1 | |a Hershey PA |b Information Science Reference |c [2012] | |
264 | 4 | |c © 2012 | |
300 | |a 1 Online-Ressource (xiv, 324 Seiten) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Premier reference source | |
500 | |a Includes bibliographical references | ||
505 | 8 | |a 1. Provable security for outsourcing database operations / Sergei Evdokimov, Matthias Fischmann and Oliver G unther -- 2. A host-based intrusion detection system using architectural features to improve sophisticated denial-of-service attack detections / Ran Tao ... [et al.] -- 3. A keystroke biometric system for long-text input / Charles C. Tappert ... [et al.] -- 4. A six-view perspective framework for system security: issues, risks, and requirements / Surya B. Yadav -- 5. Are online privacy policies readable? / M. Sumeeth, R.I. Singh and J. Miller -- 6. Protecting user privacy better with query l-diversity / Fuyu Liu and Kien A. Hua -- 7. Globalization and data privacy: an exploratory study / Robert L. Totterdale -- 8. Security issues for cloud computing / Kevin Hamlen, Murat Kantarcioglu, Latifur Khan and Bhavani Thuraisingham -- 9. Global information security factors / Garry White and Ju Long -- 10. The integrated privacy model: building a privacy model in the business processes of the enterprise / Munir Majdalawieh -- 11. Policy enforcement system for inter-organizational data sharing / Mamoun Awad, Latifur Khan and Bhavani Thuraisingham -- 12. Goals and practices in maintaining information systems security / Zippy Erlich and Moshe Zviran -- 13. Factors influencing college students' use of computer security / Norman Pendegraft and Robert W. Stone -- 14. A game theoretic approach to optimize identity exposure in pervasive computing environments / Feng W. Zhu, Sandra Carpenter, Wei Zhu and Matt Mutka -- 15. Hiding message in map along pre-Hamiltonian path / Sunil Kumar Muttoo and Vinay Kumar -- 16. Probabilistic inference channel detection and restriction applied to patients' privacy assurance / Bandar Alhaqbani and Colin Fidge | |
520 | |a "This book reviews issues and trends in security and privacy at an individual user level, as well as within global enterprises, covering enforcement of existing security technologies, factors driving their use, and goals for ensuring the continued security of information systems" - Provided by publisher | ||
650 | 4 | |a Computer security | |
650 | 4 | |a Information technology / Security measures | |
650 | 4 | |a Computer networks / Security measures | |
650 | 4 | |a Data protection | |
655 | 7 | |0 (DE-588)4143413-4 |a Aufsatzsammlung |2 gnd-content | |
700 | 1 | |a Nemati, Hamid R. |d 1958- |0 (DE-588)140041923 |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-1-4666-0026-3 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 1-4666-0026-8 |
856 | 4 | 0 | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-0026-3 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-98-IGB |a ZDB-1-IGE | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-029848561 | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-0026-3 |l DE-706 |p ZDB-98-IGB |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-4666-0026-3 |l DE-1049 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-4666-0026-3 |l DE-898 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-4666-0026-3 |l DE-1050 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-4666-0026-3 |l DE-83 |p ZDB-98-IGB |q TUB_EBS_IGB |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1808138511654584320 |
---|---|
adam_text | |
any_adam_object | |
author2 | Nemati, Hamid R. 1958- |
author2_role | edt |
author2_variant | h r n hr hrn |
author_GND | (DE-588)140041923 |
author_facet | Nemati, Hamid R. 1958- |
building | Verbundindex |
bvnumber | BV044447551 |
collection | ZDB-98-IGB ZDB-1-IGE |
contents | 1. Provable security for outsourcing database operations / Sergei Evdokimov, Matthias Fischmann and Oliver G unther -- 2. A host-based intrusion detection system using architectural features to improve sophisticated denial-of-service attack detections / Ran Tao ... [et al.] -- 3. A keystroke biometric system for long-text input / Charles C. Tappert ... [et al.] -- 4. A six-view perspective framework for system security: issues, risks, and requirements / Surya B. Yadav -- 5. Are online privacy policies readable? / M. Sumeeth, R.I. Singh and J. Miller -- 6. Protecting user privacy better with query l-diversity / Fuyu Liu and Kien A. Hua -- 7. Globalization and data privacy: an exploratory study / Robert L. Totterdale -- 8. Security issues for cloud computing / Kevin Hamlen, Murat Kantarcioglu, Latifur Khan and Bhavani Thuraisingham -- 9. Global information security factors / Garry White and Ju Long -- 10. The integrated privacy model: building a privacy model in the business processes of the enterprise / Munir Majdalawieh -- 11. Policy enforcement system for inter-organizational data sharing / Mamoun Awad, Latifur Khan and Bhavani Thuraisingham -- 12. Goals and practices in maintaining information systems security / Zippy Erlich and Moshe Zviran -- 13. Factors influencing college students' use of computer security / Norman Pendegraft and Robert W. Stone -- 14. A game theoretic approach to optimize identity exposure in pervasive computing environments / Feng W. Zhu, Sandra Carpenter, Wei Zhu and Matt Mutka -- 15. Hiding message in map along pre-Hamiltonian path / Sunil Kumar Muttoo and Vinay Kumar -- 16. Probabilistic inference channel detection and restriction applied to patients' privacy assurance / Bandar Alhaqbani and Colin Fidge |
ctrlnum | (OCoLC)1002269710 (DE-599)BVBBV044447551 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nmm a2200000zc 4500</leader><controlfield tag="001">BV044447551</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20171201</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">170811s2012 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781466600270</subfield><subfield code="9">978-1-4666-0027-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781466600287</subfield><subfield code="c">print & perpetual access</subfield><subfield code="9">978-1-4666-0028-7</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/978-1-4666-0026-3</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1002269710</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV044447551</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield><subfield code="a">DE-1049</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-1050</subfield><subfield code="a">DE-83</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Optimizing information security and advancing privacy assurance</subfield><subfield code="b">new technologies</subfield><subfield code="c">Hamid R. Nemati (University of North Carolina at Greensboro, USA)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey PA</subfield><subfield code="b">Information Science Reference</subfield><subfield code="c">[2012]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2012</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xiv, 324 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Premier reference source</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">1. Provable security for outsourcing database operations / Sergei Evdokimov, Matthias Fischmann and Oliver G unther -- 2. A host-based intrusion detection system using architectural features to improve sophisticated denial-of-service attack detections / Ran Tao ... [et al.] -- 3. A keystroke biometric system for long-text input / Charles C. Tappert ... [et al.] -- 4. A six-view perspective framework for system security: issues, risks, and requirements / Surya B. Yadav -- 5. Are online privacy policies readable? / M. Sumeeth, R.I. Singh and J. Miller -- 6. Protecting user privacy better with query l-diversity / Fuyu Liu and Kien A. Hua -- 7. Globalization and data privacy: an exploratory study / Robert L. Totterdale -- 8. Security issues for cloud computing / Kevin Hamlen, Murat Kantarcioglu, Latifur Khan and Bhavani Thuraisingham -- 9. Global information security factors / Garry White and Ju Long -- 10. The integrated privacy model: building a privacy model in the business processes of the enterprise / Munir Majdalawieh -- 11. Policy enforcement system for inter-organizational data sharing / Mamoun Awad, Latifur Khan and Bhavani Thuraisingham -- 12. Goals and practices in maintaining information systems security / Zippy Erlich and Moshe Zviran -- 13. Factors influencing college students' use of computer security / Norman Pendegraft and Robert W. Stone -- 14. A game theoretic approach to optimize identity exposure in pervasive computing environments / Feng W. Zhu, Sandra Carpenter, Wei Zhu and Matt Mutka -- 15. Hiding message in map along pre-Hamiltonian path / Sunil Kumar Muttoo and Vinay Kumar -- 16. Probabilistic inference channel detection and restriction applied to patients' privacy assurance / Bandar Alhaqbani and Colin Fidge</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"This book reviews issues and trends in security and privacy at an individual user level, as well as within global enterprises, covering enforcement of existing security technologies, factors driving their use, and goals for ensuring the continued security of information systems" - Provided by publisher</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information technology / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4143413-4</subfield><subfield code="a">Aufsatzsammlung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Nemati, Hamid R.</subfield><subfield code="d">1958-</subfield><subfield code="0">(DE-588)140041923</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-1-4666-0026-3</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1-4666-0026-8</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-0026-3</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield><subfield code="a">ZDB-1-IGE</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029848561</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-0026-3</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-4666-0026-3</subfield><subfield code="l">DE-1049</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-4666-0026-3</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-4666-0026-3</subfield><subfield code="l">DE-1050</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-4666-0026-3</subfield><subfield code="l">DE-83</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">TUB_EBS_IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | (DE-588)4143413-4 Aufsatzsammlung gnd-content |
genre_facet | Aufsatzsammlung |
id | DE-604.BV044447551 |
illustrated | Not Illustrated |
indexdate | 2024-08-23T01:07:39Z |
institution | BVB |
isbn | 9781466600270 9781466600287 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029848561 |
oclc_num | 1002269710 |
open_access_boolean | |
owner | DE-706 DE-1049 DE-898 DE-BY-UBR DE-1050 DE-83 |
owner_facet | DE-706 DE-1049 DE-898 DE-BY-UBR DE-1050 DE-83 |
physical | 1 Online-Ressource (xiv, 324 Seiten) |
psigel | ZDB-98-IGB ZDB-1-IGE ZDB-98-IGB TUB_EBS_IGB |
publishDate | 2012 |
publishDateSearch | 2012 |
publishDateSort | 2012 |
publisher | Information Science Reference |
record_format | marc |
series2 | Premier reference source |
spelling | Optimizing information security and advancing privacy assurance new technologies Hamid R. Nemati (University of North Carolina at Greensboro, USA) Hershey PA Information Science Reference [2012] © 2012 1 Online-Ressource (xiv, 324 Seiten) txt rdacontent c rdamedia cr rdacarrier Premier reference source Includes bibliographical references 1. Provable security for outsourcing database operations / Sergei Evdokimov, Matthias Fischmann and Oliver G unther -- 2. A host-based intrusion detection system using architectural features to improve sophisticated denial-of-service attack detections / Ran Tao ... [et al.] -- 3. A keystroke biometric system for long-text input / Charles C. Tappert ... [et al.] -- 4. A six-view perspective framework for system security: issues, risks, and requirements / Surya B. Yadav -- 5. Are online privacy policies readable? / M. Sumeeth, R.I. Singh and J. Miller -- 6. Protecting user privacy better with query l-diversity / Fuyu Liu and Kien A. Hua -- 7. Globalization and data privacy: an exploratory study / Robert L. Totterdale -- 8. Security issues for cloud computing / Kevin Hamlen, Murat Kantarcioglu, Latifur Khan and Bhavani Thuraisingham -- 9. Global information security factors / Garry White and Ju Long -- 10. The integrated privacy model: building a privacy model in the business processes of the enterprise / Munir Majdalawieh -- 11. Policy enforcement system for inter-organizational data sharing / Mamoun Awad, Latifur Khan and Bhavani Thuraisingham -- 12. Goals and practices in maintaining information systems security / Zippy Erlich and Moshe Zviran -- 13. Factors influencing college students' use of computer security / Norman Pendegraft and Robert W. Stone -- 14. A game theoretic approach to optimize identity exposure in pervasive computing environments / Feng W. Zhu, Sandra Carpenter, Wei Zhu and Matt Mutka -- 15. Hiding message in map along pre-Hamiltonian path / Sunil Kumar Muttoo and Vinay Kumar -- 16. Probabilistic inference channel detection and restriction applied to patients' privacy assurance / Bandar Alhaqbani and Colin Fidge "This book reviews issues and trends in security and privacy at an individual user level, as well as within global enterprises, covering enforcement of existing security technologies, factors driving their use, and goals for ensuring the continued security of information systems" - Provided by publisher Computer security Information technology / Security measures Computer networks / Security measures Data protection (DE-588)4143413-4 Aufsatzsammlung gnd-content Nemati, Hamid R. 1958- (DE-588)140041923 edt Erscheint auch als Druck-Ausgabe 978-1-4666-0026-3 Erscheint auch als Druck-Ausgabe 1-4666-0026-8 http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-0026-3 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Optimizing information security and advancing privacy assurance new technologies 1. Provable security for outsourcing database operations / Sergei Evdokimov, Matthias Fischmann and Oliver G unther -- 2. A host-based intrusion detection system using architectural features to improve sophisticated denial-of-service attack detections / Ran Tao ... [et al.] -- 3. A keystroke biometric system for long-text input / Charles C. Tappert ... [et al.] -- 4. A six-view perspective framework for system security: issues, risks, and requirements / Surya B. Yadav -- 5. Are online privacy policies readable? / M. Sumeeth, R.I. Singh and J. Miller -- 6. Protecting user privacy better with query l-diversity / Fuyu Liu and Kien A. Hua -- 7. Globalization and data privacy: an exploratory study / Robert L. Totterdale -- 8. Security issues for cloud computing / Kevin Hamlen, Murat Kantarcioglu, Latifur Khan and Bhavani Thuraisingham -- 9. Global information security factors / Garry White and Ju Long -- 10. The integrated privacy model: building a privacy model in the business processes of the enterprise / Munir Majdalawieh -- 11. Policy enforcement system for inter-organizational data sharing / Mamoun Awad, Latifur Khan and Bhavani Thuraisingham -- 12. Goals and practices in maintaining information systems security / Zippy Erlich and Moshe Zviran -- 13. Factors influencing college students' use of computer security / Norman Pendegraft and Robert W. Stone -- 14. A game theoretic approach to optimize identity exposure in pervasive computing environments / Feng W. Zhu, Sandra Carpenter, Wei Zhu and Matt Mutka -- 15. Hiding message in map along pre-Hamiltonian path / Sunil Kumar Muttoo and Vinay Kumar -- 16. Probabilistic inference channel detection and restriction applied to patients' privacy assurance / Bandar Alhaqbani and Colin Fidge Computer security Information technology / Security measures Computer networks / Security measures Data protection |
subject_GND | (DE-588)4143413-4 |
title | Optimizing information security and advancing privacy assurance new technologies |
title_auth | Optimizing information security and advancing privacy assurance new technologies |
title_exact_search | Optimizing information security and advancing privacy assurance new technologies |
title_full | Optimizing information security and advancing privacy assurance new technologies Hamid R. Nemati (University of North Carolina at Greensboro, USA) |
title_fullStr | Optimizing information security and advancing privacy assurance new technologies Hamid R. Nemati (University of North Carolina at Greensboro, USA) |
title_full_unstemmed | Optimizing information security and advancing privacy assurance new technologies Hamid R. Nemati (University of North Carolina at Greensboro, USA) |
title_short | Optimizing information security and advancing privacy assurance |
title_sort | optimizing information security and advancing privacy assurance new technologies |
title_sub | new technologies |
topic | Computer security Information technology / Security measures Computer networks / Security measures Data protection |
topic_facet | Computer security Information technology / Security measures Computer networks / Security measures Data protection Aufsatzsammlung |
url | http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-0026-3 |
work_keys_str_mv | AT nematihamidr optimizinginformationsecurityandadvancingprivacyassurancenewtechnologies |