Detection and mitigation of insider attacks in a cloud infrastructure: emerging research and opportunities
"This book looks at the security vulnerabilities associated with consumer virtual machines. It focuses on crucial challenge of ensuring the data confidentiality and integrity for the arbitrary software execution of consumer virtual machines. It also contains an empirical method to accumulate ev...
Gespeichert in:
Hauptverfasser: | , , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey, Pennsylvania
IGI Global
[2019]
|
Schlagworte: | |
Online-Zugang: | DE-91 DE-573 DE-20 DE-1049 DE-898 DE-706 DE-1050 DE-83 Volltex |
Zusammenfassung: | "This book looks at the security vulnerabilities associated with consumer virtual machines. It focuses on crucial challenge of ensuring the data confidentiality and integrity for the arbitrary software execution of consumer virtual machines. It also contains an empirical method to accumulate evidences of security flaws in existence methods and implemented a prototype to prevent and detect attacks"-- |
Beschreibung: | Description based on title screen (IGI Global, viewed 01/24/2019) |
Beschreibung: | 1 Online-Ressource (14 PDFs (113 pages)) |
ISBN: | 9781522579250 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV046096249 | ||
003 | DE-604 | ||
007 | cr|uuu---uuuuu | ||
008 | 190809s2019 |||| o||u| ||||||eng d | ||
020 | |a 9781522579250 |9 978-1-5225-7925-0 | ||
024 | 7 | |a 10.4018/978-1-5225-7924-3 |2 doi | |
035 | |a (ZDB-1-IGE)00211104 | ||
035 | |a (OCoLC)1085410708 | ||
035 | |a (DE-599)BVBBV046096249 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-91 |a DE-573 |a DE-20 |a DE-1049 |a DE-898 |a DE-706 |a DE-1050 |a DE-83 | ||
082 | 0 | |a 004.67/82 |2 23 | |
100 | 1 | |a Gunasekhar, T. |d 1990- |e Verfasser |4 aut | |
245 | 1 | 0 | |a Detection and mitigation of insider attacks in a cloud infrastructure |b emerging research and opportunities |c by T. Gunasekhar, K. Thirupathi Rao, P. Sai Kiran, V. Krishna Reddy, and B. Thirumala Rao |
264 | 1 | |a Hershey, Pennsylvania |b IGI Global |c [2019] | |
300 | |a 1 Online-Ressource (14 PDFs (113 pages)) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Description based on title screen (IGI Global, viewed 01/24/2019) | ||
520 | |a "This book looks at the security vulnerabilities associated with consumer virtual machines. It focuses on crucial challenge of ensuring the data confidentiality and integrity for the arbitrary software execution of consumer virtual machines. It also contains an empirical method to accumulate evidences of security flaws in existence methods and implemented a prototype to prevent and detect attacks"-- | ||
650 | 4 | |a Cloud computing / Security measures | |
650 | 4 | |a Virtual computer systems / Security measures | |
650 | 4 | |a Computer crimes / Prevention | |
700 | 1 | |a Rao, K. Thirupathi |4 aut | |
700 | 1 | |a Kiran, P. Sai |4 aut | |
700 | 1 | |a Krishna Reddy, V. |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 1522579249 |z 9781522579243 |
856 | 4 | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7924-3 |x Verlag |z URL des Erstveröffentlichers |3 Volltex | |
912 | |a ZDB-1-IGE |a ZDB-98-IGB | ||
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7924-3 |l DE-91 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7924-3 |l DE-573 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7924-3 |l DE-20 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7924-3 |l DE-1049 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7924-3 |l DE-898 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7924-3 |l DE-706 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7924-3 |l DE-1050 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7924-3 |l DE-83 |p ZDB-98-IGB |q TUB_EBS_IGB |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1805079020046385152 |
---|---|
adam_text | |
any_adam_object | |
author | Gunasekhar, T. 1990- Rao, K. Thirupathi Kiran, P. Sai Krishna Reddy, V. |
author_facet | Gunasekhar, T. 1990- Rao, K. Thirupathi Kiran, P. Sai Krishna Reddy, V. |
author_role | aut aut aut aut |
author_sort | Gunasekhar, T. 1990- |
author_variant | t g tg k t r kt ktr p s k ps psk r v k rv rvk |
building | Verbundindex |
bvnumber | BV046096249 |
collection | ZDB-1-IGE ZDB-98-IGB |
ctrlnum | (ZDB-1-IGE)00211104 (OCoLC)1085410708 (DE-599)BVBBV046096249 |
dewey-full | 004.67/82 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004.67/82 |
dewey-search | 004.67/82 |
dewey-sort | 14.67 282 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nmm a2200000zc 4500</leader><controlfield tag="001">BV046096249</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">190809s2019 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781522579250</subfield><subfield code="9">978-1-5225-7925-0</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/978-1-5225-7924-3</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-1-IGE)00211104</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1085410708</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046096249</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-1049</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-1050</subfield><subfield code="a">DE-83</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004.67/82</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Gunasekhar, T.</subfield><subfield code="d">1990-</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Detection and mitigation of insider attacks in a cloud infrastructure</subfield><subfield code="b">emerging research and opportunities</subfield><subfield code="c">by T. Gunasekhar, K. Thirupathi Rao, P. Sai Kiran, V. Krishna Reddy, and B. Thirumala Rao</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, Pennsylvania</subfield><subfield code="b">IGI Global</subfield><subfield code="c">[2019]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (14 PDFs (113 pages))</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based on title screen (IGI Global, viewed 01/24/2019)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"This book looks at the security vulnerabilities associated with consumer virtual machines. It focuses on crucial challenge of ensuring the data confidentiality and integrity for the arbitrary software execution of consumer virtual machines. It also contains an empirical method to accumulate evidences of security flaws in existence methods and implemented a prototype to prevent and detect attacks"--</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cloud computing / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Virtual computer systems / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes / Prevention</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Rao, K. Thirupathi</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kiran, P. Sai</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Krishna Reddy, V.</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1522579249</subfield><subfield code="z">9781522579243</subfield></datafield><datafield tag="856" ind1="4" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7924-3</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltex</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-1-IGE</subfield><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7924-3</subfield><subfield code="l">DE-91</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7924-3</subfield><subfield code="l">DE-573</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7924-3</subfield><subfield code="l">DE-20</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7924-3</subfield><subfield code="l">DE-1049</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7924-3</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7924-3</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7924-3</subfield><subfield code="l">DE-1050</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7924-3</subfield><subfield code="l">DE-83</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">TUB_EBS_IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV046096249 |
illustrated | Not Illustrated |
indexdate | 2024-07-20T06:38:20Z |
institution | BVB |
isbn | 9781522579250 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-031477104 |
oclc_num | 1085410708 |
open_access_boolean | |
owner | DE-91 DE-BY-TUM DE-573 DE-20 DE-1049 DE-898 DE-BY-UBR DE-706 DE-1050 DE-83 |
owner_facet | DE-91 DE-BY-TUM DE-573 DE-20 DE-1049 DE-898 DE-BY-UBR DE-706 DE-1050 DE-83 |
physical | 1 Online-Ressource (14 PDFs (113 pages)) |
psigel | ZDB-1-IGE ZDB-98-IGB ZDB-98-IGB TUB_EBS_IGB |
publishDate | 2019 |
publishDateSearch | 2019 |
publishDateSort | 2019 |
publisher | IGI Global |
record_format | marc |
spelling | Gunasekhar, T. 1990- Verfasser aut Detection and mitigation of insider attacks in a cloud infrastructure emerging research and opportunities by T. Gunasekhar, K. Thirupathi Rao, P. Sai Kiran, V. Krishna Reddy, and B. Thirumala Rao Hershey, Pennsylvania IGI Global [2019] 1 Online-Ressource (14 PDFs (113 pages)) txt rdacontent c rdamedia cr rdacarrier Description based on title screen (IGI Global, viewed 01/24/2019) "This book looks at the security vulnerabilities associated with consumer virtual machines. It focuses on crucial challenge of ensuring the data confidentiality and integrity for the arbitrary software execution of consumer virtual machines. It also contains an empirical method to accumulate evidences of security flaws in existence methods and implemented a prototype to prevent and detect attacks"-- Cloud computing / Security measures Virtual computer systems / Security measures Computer crimes / Prevention Rao, K. Thirupathi aut Kiran, P. Sai aut Krishna Reddy, V. aut Erscheint auch als Druck-Ausgabe 1522579249 9781522579243 http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7924-3 Verlag URL des Erstveröffentlichers Volltex |
spellingShingle | Gunasekhar, T. 1990- Rao, K. Thirupathi Kiran, P. Sai Krishna Reddy, V. Detection and mitigation of insider attacks in a cloud infrastructure emerging research and opportunities Cloud computing / Security measures Virtual computer systems / Security measures Computer crimes / Prevention |
title | Detection and mitigation of insider attacks in a cloud infrastructure emerging research and opportunities |
title_auth | Detection and mitigation of insider attacks in a cloud infrastructure emerging research and opportunities |
title_exact_search | Detection and mitigation of insider attacks in a cloud infrastructure emerging research and opportunities |
title_full | Detection and mitigation of insider attacks in a cloud infrastructure emerging research and opportunities by T. Gunasekhar, K. Thirupathi Rao, P. Sai Kiran, V. Krishna Reddy, and B. Thirumala Rao |
title_fullStr | Detection and mitigation of insider attacks in a cloud infrastructure emerging research and opportunities by T. Gunasekhar, K. Thirupathi Rao, P. Sai Kiran, V. Krishna Reddy, and B. Thirumala Rao |
title_full_unstemmed | Detection and mitigation of insider attacks in a cloud infrastructure emerging research and opportunities by T. Gunasekhar, K. Thirupathi Rao, P. Sai Kiran, V. Krishna Reddy, and B. Thirumala Rao |
title_short | Detection and mitigation of insider attacks in a cloud infrastructure |
title_sort | detection and mitigation of insider attacks in a cloud infrastructure emerging research and opportunities |
title_sub | emerging research and opportunities |
topic | Cloud computing / Security measures Virtual computer systems / Security measures Computer crimes / Prevention |
topic_facet | Cloud computing / Security measures Virtual computer systems / Security measures Computer crimes / Prevention |
url | http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7924-3 |
work_keys_str_mv | AT gunasekhart detectionandmitigationofinsiderattacksinacloudinfrastructureemergingresearchandopportunities AT raokthirupathi detectionandmitigationofinsiderattacksinacloudinfrastructureemergingresearchandopportunities AT kiranpsai detectionandmitigationofinsiderattacksinacloudinfrastructureemergingresearchandopportunities AT krishnareddyv detectionandmitigationofinsiderattacksinacloudinfrastructureemergingresearchandopportunities |