Detection and mitigation of insider attacks in a cloud infrastructure: emerging research and opportunities
"This book looks at the security vulnerabilities associated with consumer virtual machines. It focuses on crucial challenge of ensuring the data confidentiality and integrity for the arbitrary software execution of consumer virtual machines. It also contains an empirical method to accumulate ev...
Gespeichert in:
Hauptverfasser: | , , , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) :
IGI Global,
[2019]
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | "This book looks at the security vulnerabilities associated with consumer virtual machines. It focuses on crucial challenge of ensuring the data confidentiality and integrity for the arbitrary software execution of consumer virtual machines. It also contains an empirical method to accumulate evidences of security flaws in existence methods and implemented a prototype to prevent and detect attacks"-- |
Beschreibung: | 14 PDFs (113 pages) Also available in print. |
Format: | Mode of access: World Wide Web. |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 9781522579250 |
Zugangseinschränkungen: | Restricted to subscribers or individual electronic text purchasers. |
Internformat
MARC
LEADER | 00000nam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-98-IGB-00211104 | ||
003 | IGIG | ||
005 | 20190123181527.0 | ||
006 | m eo d | ||
007 | cr bn |||m|||a | ||
008 | 190124s2019 pau fob 001 0 eng d | ||
010 | |z 2018038726 | ||
020 | |a 9781522579250 |q ebook | ||
020 | |z 9781522579243 |q hardcover | ||
024 | 7 | |a 10.4018/978-1-5225-7924-3 |2 doi | |
035 | |a (CaBNVSL)slc20627400 | ||
035 | |a (OCoLC)1083341921 | ||
040 | |a CaBNVSL |b eng |e rda |c CaBNVSL |d CaBNVSL | ||
050 | 4 | |a QA76.585 |b .G86 2019e | |
082 | 7 | |a 004.67/82 |2 23 | |
100 | 1 | |a Gunasekhar, T., |d 1990- |e author. | |
245 | 1 | 0 | |a Detection and mitigation of insider attacks in a cloud infrastructure |b emerging research and opportunities |c by T. Gunasekhar, K. Thirupathi Rao, P. Sai Kiran, V. Krishna Reddy, and B. Thirumala Rao. |
264 | 1 | |a Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) : |b IGI Global, |c [2019] | |
300 | |a 14 PDFs (113 pages) | ||
336 | |a text |2 rdacontent | ||
337 | |a electronic |2 isbdmedia | ||
338 | |a online resource |2 rdacarrier | ||
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a Chapter 1. Security architecture of cloud computing -- Chapter 2. Trusted cloud computing -- Chapter 3. A Survey on insider attacks in IAAS-based cloud -- Chapter 4. Security flaws and design issues in cloud infrastructure -- Chapter 5. Trustworthy framework for insider attack prevention and detection -- Chapter 6. Results and discussions. | |
506 | |a Restricted to subscribers or individual electronic text purchasers. | ||
520 | 3 | |a "This book looks at the security vulnerabilities associated with consumer virtual machines. It focuses on crucial challenge of ensuring the data confidentiality and integrity for the arbitrary software execution of consumer virtual machines. It also contains an empirical method to accumulate evidences of security flaws in existence methods and implemented a prototype to prevent and detect attacks"-- |c Provided by publisher. | |
530 | |a Also available in print. | ||
538 | |a Mode of access: World Wide Web. | ||
588 | |a Description based on title screen (IGI Global, viewed 01/24/2019). | ||
650 | 0 | |a Cloud computing |x Security measures. | |
650 | 0 | |a Computer crimes |x Prevention. | |
650 | 0 | |a Virtual computer systems |x Security measures. | |
700 | 1 | |a Kiran, P. Sai, |e author. | |
700 | 1 | |a Krishna Reddy, V., |e author. | |
700 | 1 | |a Rao, B. Thirumala, |e author. | |
700 | 1 | |a Rao, K. Thirupathi, |e author. | |
710 | 2 | |a IGI Global, |e publisher. | |
776 | 0 | |c (Original) |w (DLC)2018038726 | |
776 | 0 | 8 | |i Print version: |z 1522579249 |z 9781522579243 |w (DLC) 2018038726 |
856 | 4 | 0 | |l FWS01 |p ZDB-98-IGB |q FWS_PDA_IGB |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7924-3 |3 Volltext |
912 | |a ZDB-98-IGB | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-98-IGB-00211104 |
---|---|
_version_ | 1816797081228017664 |
adam_text | |
any_adam_object | |
author | Gunasekhar, T., 1990- Kiran, P. Sai Krishna Reddy, V. Rao, B. Thirumala Rao, K. Thirupathi |
author_facet | Gunasekhar, T., 1990- Kiran, P. Sai Krishna Reddy, V. Rao, B. Thirumala Rao, K. Thirupathi |
author_role | aut aut aut aut aut |
author_sort | Gunasekhar, T., 1990- |
author_variant | t g tg p s k ps psk r v k rv rvk b t r bt btr k t r kt ktr |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.585 .G86 2019e |
callnumber-search | QA76.585 .G86 2019e |
callnumber-sort | QA 276.585 G86 42019E |
callnumber-subject | QA - Mathematics |
collection | ZDB-98-IGB |
contents | Chapter 1. Security architecture of cloud computing -- Chapter 2. Trusted cloud computing -- Chapter 3. A Survey on insider attacks in IAAS-based cloud -- Chapter 4. Security flaws and design issues in cloud infrastructure -- Chapter 5. Trustworthy framework for insider attack prevention and detection -- Chapter 6. Results and discussions. |
ctrlnum | (CaBNVSL)slc20627400 (OCoLC)1083341921 |
dewey-full | 004.67/82 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004.67/82 |
dewey-search | 004.67/82 |
dewey-sort | 14.67 282 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02799nam a2200505 i 4500</leader><controlfield tag="001">ZDB-98-IGB-00211104</controlfield><controlfield tag="003">IGIG</controlfield><controlfield tag="005">20190123181527.0</controlfield><controlfield tag="006">m eo d </controlfield><controlfield tag="007">cr bn |||m|||a</controlfield><controlfield tag="008">190124s2019 pau fob 001 0 eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="z"> 2018038726</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781522579250</subfield><subfield code="q">ebook</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781522579243</subfield><subfield code="q">hardcover</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/978-1-5225-7924-3</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaBNVSL)slc20627400</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1083341921</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">CaBNVSL</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="c">CaBNVSL</subfield><subfield code="d">CaBNVSL</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.585</subfield><subfield code="b">.G86 2019e</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">004.67/82</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Gunasekhar, T.,</subfield><subfield code="d">1990-</subfield><subfield code="e">author.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Detection and mitigation of insider attacks in a cloud infrastructure </subfield><subfield code="b">emerging research and opportunities </subfield><subfield code="c">by T. Gunasekhar, K. Thirupathi Rao, P. Sai Kiran, V. Krishna Reddy, and B. Thirumala Rao.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) :</subfield><subfield code="b">IGI Global,</subfield><subfield code="c">[2019]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">14 PDFs (113 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">electronic</subfield><subfield code="2">isbdmedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Chapter 1. Security architecture of cloud computing -- Chapter 2. Trusted cloud computing -- Chapter 3. A Survey on insider attacks in IAAS-based cloud -- Chapter 4. Security flaws and design issues in cloud infrastructure -- Chapter 5. Trustworthy framework for insider attack prevention and detection -- Chapter 6. Results and discussions.</subfield></datafield><datafield tag="506" ind1=" " ind2=" "><subfield code="a">Restricted to subscribers or individual electronic text purchasers.</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">"This book looks at the security vulnerabilities associated with consumer virtual machines. It focuses on crucial challenge of ensuring the data confidentiality and integrity for the arbitrary software execution of consumer virtual machines. It also contains an empirical method to accumulate evidences of security flaws in existence methods and implemented a prototype to prevent and detect attacks"--</subfield><subfield code="c">Provided by publisher.</subfield></datafield><datafield tag="530" ind1=" " ind2=" "><subfield code="a">Also available in print.</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: World Wide Web.</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on title screen (IGI Global, viewed 01/24/2019).</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cloud computing</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer crimes</subfield><subfield code="x">Prevention.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Virtual computer systems</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kiran, P. Sai,</subfield><subfield code="e">author.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Krishna Reddy, V.,</subfield><subfield code="e">author.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Rao, B. Thirumala,</subfield><subfield code="e">author.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Rao, K. Thirupathi,</subfield><subfield code="e">author.</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">IGI Global,</subfield><subfield code="e">publisher.</subfield></datafield><datafield tag="776" ind1="0" ind2=" "><subfield code="c">(Original)</subfield><subfield code="w">(DLC)2018038726</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="z">1522579249</subfield><subfield code="z">9781522579243</subfield><subfield code="w">(DLC) 2018038726</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FWS_PDA_IGB</subfield><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7924-3</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-98-IGB-00211104 |
illustrated | Not Illustrated |
indexdate | 2024-11-26T14:51:54Z |
institution | BVB |
isbn | 9781522579250 |
language | English |
oclc_num | 1083341921 |
open_access_boolean | |
owner | DE-863 DE-BY-FWS |
owner_facet | DE-863 DE-BY-FWS |
physical | 14 PDFs (113 pages) Also available in print. |
psigel | ZDB-98-IGB |
publishDate | 2019 |
publishDateSearch | 2019 |
publishDateSort | 2019 |
publisher | IGI Global, |
record_format | marc |
spelling | Gunasekhar, T., 1990- author. Detection and mitigation of insider attacks in a cloud infrastructure emerging research and opportunities by T. Gunasekhar, K. Thirupathi Rao, P. Sai Kiran, V. Krishna Reddy, and B. Thirumala Rao. Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) : IGI Global, [2019] 14 PDFs (113 pages) text rdacontent electronic isbdmedia online resource rdacarrier Includes bibliographical references and index. Chapter 1. Security architecture of cloud computing -- Chapter 2. Trusted cloud computing -- Chapter 3. A Survey on insider attacks in IAAS-based cloud -- Chapter 4. Security flaws and design issues in cloud infrastructure -- Chapter 5. Trustworthy framework for insider attack prevention and detection -- Chapter 6. Results and discussions. Restricted to subscribers or individual electronic text purchasers. "This book looks at the security vulnerabilities associated with consumer virtual machines. It focuses on crucial challenge of ensuring the data confidentiality and integrity for the arbitrary software execution of consumer virtual machines. It also contains an empirical method to accumulate evidences of security flaws in existence methods and implemented a prototype to prevent and detect attacks"-- Provided by publisher. Also available in print. Mode of access: World Wide Web. Description based on title screen (IGI Global, viewed 01/24/2019). Cloud computing Security measures. Computer crimes Prevention. Virtual computer systems Security measures. Kiran, P. Sai, author. Krishna Reddy, V., author. Rao, B. Thirumala, author. Rao, K. Thirupathi, author. IGI Global, publisher. (Original) (DLC)2018038726 Print version: 1522579249 9781522579243 (DLC) 2018038726 FWS01 ZDB-98-IGB FWS_PDA_IGB http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7924-3 Volltext |
spellingShingle | Gunasekhar, T., 1990- Kiran, P. Sai Krishna Reddy, V. Rao, B. Thirumala Rao, K. Thirupathi Detection and mitigation of insider attacks in a cloud infrastructure emerging research and opportunities Chapter 1. Security architecture of cloud computing -- Chapter 2. Trusted cloud computing -- Chapter 3. A Survey on insider attacks in IAAS-based cloud -- Chapter 4. Security flaws and design issues in cloud infrastructure -- Chapter 5. Trustworthy framework for insider attack prevention and detection -- Chapter 6. Results and discussions. Cloud computing Security measures. Computer crimes Prevention. Virtual computer systems Security measures. |
title | Detection and mitigation of insider attacks in a cloud infrastructure emerging research and opportunities |
title_auth | Detection and mitigation of insider attacks in a cloud infrastructure emerging research and opportunities |
title_exact_search | Detection and mitigation of insider attacks in a cloud infrastructure emerging research and opportunities |
title_full | Detection and mitigation of insider attacks in a cloud infrastructure emerging research and opportunities by T. Gunasekhar, K. Thirupathi Rao, P. Sai Kiran, V. Krishna Reddy, and B. Thirumala Rao. |
title_fullStr | Detection and mitigation of insider attacks in a cloud infrastructure emerging research and opportunities by T. Gunasekhar, K. Thirupathi Rao, P. Sai Kiran, V. Krishna Reddy, and B. Thirumala Rao. |
title_full_unstemmed | Detection and mitigation of insider attacks in a cloud infrastructure emerging research and opportunities by T. Gunasekhar, K. Thirupathi Rao, P. Sai Kiran, V. Krishna Reddy, and B. Thirumala Rao. |
title_short | Detection and mitigation of insider attacks in a cloud infrastructure |
title_sort | detection and mitigation of insider attacks in a cloud infrastructure emerging research and opportunities |
title_sub | emerging research and opportunities |
topic | Cloud computing Security measures. Computer crimes Prevention. Virtual computer systems Security measures. |
topic_facet | Cloud computing Security measures. Computer crimes Prevention. Virtual computer systems Security measures. |
url | http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7924-3 |
work_keys_str_mv | AT gunasekhart detectionandmitigationofinsiderattacksinacloudinfrastructureemergingresearchandopportunities AT kiranpsai detectionandmitigationofinsiderattacksinacloudinfrastructureemergingresearchandopportunities AT krishnareddyv detectionandmitigationofinsiderattacksinacloudinfrastructureemergingresearchandopportunities AT raobthirumala detectionandmitigationofinsiderattacksinacloudinfrastructureemergingresearchandopportunities AT raokthirupathi detectionandmitigationofinsiderattacksinacloudinfrastructureemergingresearchandopportunities AT igiglobal detectionandmitigationofinsiderattacksinacloudinfrastructureemergingresearchandopportunities |