Detection and mitigation of insider attacks in a cloud infrastructure: emerging research and opportunities

"This book looks at the security vulnerabilities associated with consumer virtual machines. It focuses on crucial challenge of ensuring the data confidentiality and integrity for the arbitrary software execution of consumer virtual machines. It also contains an empirical method to accumulate ev...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Gunasekhar, T. 1990- (VerfasserIn), Rao, K. Thirupathi (VerfasserIn), Kiran, P. Sai (VerfasserIn), Krishna Reddy, V. (VerfasserIn)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: Hershey, Pennsylvania IGI Global [2019]
Schlagworte:
Online-Zugang:DE-91
DE-573
DE-20
DE-1049
DE-898
DE-706
DE-1050
DE-83
Volltex
Zusammenfassung:"This book looks at the security vulnerabilities associated with consumer virtual machines. It focuses on crucial challenge of ensuring the data confidentiality and integrity for the arbitrary software execution of consumer virtual machines. It also contains an empirical method to accumulate evidences of security flaws in existence methods and implemented a prototype to prevent and detect attacks"--
Beschreibung:Description based on title screen (IGI Global, viewed 01/24/2019)
Beschreibung:1 Online-Ressource (14 PDFs (113 pages))
ISBN:9781522579250

Es ist kein Print-Exemplar vorhanden.

Fernleihe Bestellen Achtung: Nicht im THWS-Bestand!