Detection and mitigation of insider attacks in a cloud infrastructure: emerging research and opportunities

"This book looks at the security vulnerabilities associated with consumer virtual machines. It focuses on crucial challenge of ensuring the data confidentiality and integrity for the arbitrary software execution of consumer virtual machines. It also contains an empirical method to accumulate ev...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Gunasekhar, T., 1990- (VerfasserIn), Kiran, P. Sai (VerfasserIn), Krishna Reddy, V. (VerfasserIn), Rao, B. Thirumala (VerfasserIn), Rao, K. Thirupathi (VerfasserIn)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) : IGI Global, [2019]
Schlagworte:
Online-Zugang:Volltext
Zusammenfassung:"This book looks at the security vulnerabilities associated with consumer virtual machines. It focuses on crucial challenge of ensuring the data confidentiality and integrity for the arbitrary software execution of consumer virtual machines. It also contains an empirical method to accumulate evidences of security flaws in existence methods and implemented a prototype to prevent and detect attacks"--
Beschreibung:14 PDFs (113 pages)
Also available in print.
Format:Mode of access: World Wide Web.
Bibliographie:Includes bibliographical references and index.
ISBN:9781522579250
Zugangseinschränkungen:Restricted to subscribers or individual electronic text purchasers.

Es ist kein Print-Exemplar vorhanden.

Volltext öffnen