Detection and mitigation of insider attacks in a cloud infrastructure: emerging research and opportunities

"This book looks at the security vulnerabilities associated with consumer virtual machines. It focuses on crucial challenge of ensuring the data confidentiality and integrity for the arbitrary software execution of consumer virtual machines. It also contains an empirical method to accumulate ev...

Full description

Saved in:
Bibliographic Details
Main Authors: Gunasekhar, T. 1990- (Author), Rao, K. Thirupathi (Author), Kiran, P. Sai (Author), Krishna Reddy, V. (Author)
Format: Electronic eBook
Language:English
Published: Hershey, Pennsylvania IGI Global [2019]
Subjects:
Online Access:DE-91
DE-573
DE-20
DE-1049
DE-898
DE-706
DE-1050
DE-83
Volltex
Summary:"This book looks at the security vulnerabilities associated with consumer virtual machines. It focuses on crucial challenge of ensuring the data confidentiality and integrity for the arbitrary software execution of consumer virtual machines. It also contains an empirical method to accumulate evidences of security flaws in existence methods and implemented a prototype to prevent and detect attacks"--
Item Description:Description based on title screen (IGI Global, viewed 01/24/2019)
Physical Description:1 Online-Ressource (14 PDFs (113 pages))
ISBN:9781522579250

There is no print copy available.

Interlibrary loan Place Request Caution: Not in THWS collection!