From Database to Cyber Security: Essays Dedicated to Sushil Jajodia on the Occasion of His 70th Birthday (Lecture Notes in Computer Science, 11170) 🔍
Sushil Jajodia; Pierangela Samarati; Indrajit Ray, (Computer scientist); Indrakshi Ray Springer International Publishing : Imprint : Springer, Lecture Notes in Computer Science, Lecture Notes in Computer Science 11170, 1, 2018
英语 [en] · PDF · 35.9MB · 2018 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/scihub/zlib · Save
描述
This Festschrift is in honor of Sushil Jajodia, Professor in the George Mason University, USA, on the occasion of his 70th birthday. This book contains papers written in honor of Sushil Jajodia, of his vision and his achievements. Sushil has sustained a highly active research agenda spanning several important areas in computer security and privacy, and established himself as a leader in the security research community through unique scholarship and service. He has extraordinarily impacted the scientific and academic community, opening and pioneering new directions of research, and significantly influencing the research and development of security solutions worldwide. Also, his excellent record of research funding shows his commitment to sponsored research and the practical impact of his work.
The research areas presented in this Festschrift include membrane computing, spiking neural networks, phylogenetic networks, ant colonies optimization, work bench for bio-computing, reaction systems, entropy of computation, rewriting systems, and insertion-deletion systems.
备用文件名
lgrsnf/O:\genesis4\!!!springer\10.1007%2F978-3-030-04834-1.pdf
备用文件名
nexusstc/From Database to Cyber Security: Essays Dedicated to Sushil Jajodia on the Occasion of His 70th Birthday/82170eac94769d9233b9447ba410c7e6.pdf
备用文件名
scihub/10.1007/978-3-030-04834-1.pdf
备用文件名
zlib/Computers/Pierangela Samarati, Indrajit Ray, Indrakshi Ray/From Database to Cyber Security: Essays Dedicated to Sushil Jajodia on the Occasion of His 70th Birthday_3660809.pdf
备选作者
Author
备用出版商
Springer Nature Switzerland AG
备用版本
Lecture notes in computer science, 11170, Cham, Switzerland, 2018
备用版本
Lecture Notes in Computer Science 11170, 1st ed., 2018
备用版本
Security and Cryptology, 1st ed. 2018, Cham, 2018
备用版本
LNCS sublibrary, 1st ed. 2018, Cham, 2018
备用版本
Springer Nature, Cham, 2018
备用版本
Switzerland, Switzerland
备用版本
Nov 30, 2018
备用版本
2, 20181130
备用版本
2019
元数据中的注释
lg2310304
元数据中的注释
{"container_title":"Lecture Notes in Computer Science","edition":"1","isbns":["3030048330","3030048349","9783030048334","9783030048341"],"issns":["0302-9743","1611-3349"],"publisher":"Springer","series":"Lecture Notes in Computer Science 11170"}
元数据中的注释
Source title: From Database to Cyber Security: Essays Dedicated to Sushil Jajodia on the Occasion of His 70th Birthday (Lecture Notes in Computer Science (11170))
备用描述
Front Matter ....Pages I-XII
From Cyber Situational Awareness to Adaptive Cyber Defense: Leveling the Cyber Playing Field (Massimiliano Albanese)....Pages 1-23
Policy Engineering in RBAC and ABAC (Saptarshi Das, Barsha Mitra, Vijayalakshmi Atluri, Jaideep Vaidya, Shamik Sural)....Pages 24-54
Comprehensive Security Assurance Measures for Virtualized Server Environments (Ramaswamy Chandramouli)....Pages 55-77
Stratification Based Model for Security Policy with Exceptions and Contraries to Duty (Frédéric Cuppens, Nora Cuppens-Boulahia)....Pages 78-103
Asymptotic Behavior of Attack Graph Games (George Cybenko, Gabriel F. Stocco)....Pages 104-112
Some Ideas on Privacy-Aware Data Analytics in the Internet-of-Everything (Stelvio Cimato, Ernesto Damiani)....Pages 113-124
Protecting Resources and Regulating Access in Cloud-Based Object Storage (Enrico Bacis, Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Marco Rosa, Pierangela Samarati)....Pages 125-142
Function-Based Access Control (FBAC): Towards Preventing Insider Threats in Organizations (Yvo Desmedt, Arash Shaghaghi)....Pages 143-165
Virtualization Technologies and Cloud Security: Advantages, Issues, and Perspectives (Roberto Di Pietro, Flavio Lombardi)....Pages 166-185
Access Privacy in the Cloud (Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Gerardo Pelosi, Pierangela Samarati)....Pages 186-205
A Strategy for Effective Alert Analysis at a Cyber Security Operations Center (Rajesh Ganesan, Ankit Shah)....Pages 206-226
Retrieval of Relevant Historical Data Triage Operations in Security Operation Centers (Tao Lin, Chen Zhong, John Yen, Peng Liu)....Pages 227-243
Supporting Users in Cloud Plan Selection (Sabrina De Capitani di Vimercati, Sara Foresti, Giovanni Livraga, Vincenzo Piuri, Pierangela Samarati)....Pages 244-260
Distributed Services Attestation in IoT (Mauro Conti, Edlira Dushku, Luigi V. Mancini)....Pages 261-273
Exploiting Data Sensitivity on Partitioned Data (Sharad Mehrotra, Kerim Yasin Oktay, Shantanu Sharma)....Pages 274-299
A Review of Graph Approaches to Network Security Analytics (Steven Noel)....Pages 300-323
Advanced Biometric Technologies: Emerging Scenarios and Research Trends (Angelo Genovese, Enrique Muñoz, Vincenzo Piuri, Fabio Scotti)....Pages 324-352
Attribute-Based Encryption: Applications and Future Directions (Bruhadeshwar Bezawada, Indrakshi Ray)....Pages 353-374
Static Analysis for Security Vetting of Android Apps (Sankardas Roy, Dewan Chaulagain, Shiva Bhusal)....Pages 375-404
Breaking Bad: Forecasting Adversarial Android Bad Behavior (Shang Li, Srijan Kumar, Tudor Dumitras, V. S. Subrahmanian)....Pages 405-431
Bot or Human? A Behavior-Based Online Bot Detection System (Zi Chu, Steven Gianvecchio, Haining Wang)....Pages 432-449
Network Security Metrics: From Known Vulnerabilities to Zero Day Attacks (Lingyu Wang, Mengyuan Zhang, Anoop Singhal)....Pages 450-469
Theoretical Foundations for Mobile Target Defense: Proactive Secret Sharing and Secure Multiparty Computation (Karim Eldefrawy, Rafail Ostrovsky, Moti Yung)....Pages 470-486
Back Matter ....Pages 487-487
备用描述
Keine Beschreibung vorhanden.
Erscheinungsdatum: 30.11.2018
开源日期
2019-01-12
更多信息……

🚀 快速下载

成为会员以支持书籍、论文等的长期保存。为了感谢您对我们的支持,您将获得高速下载权益。❤️
如果您在本月捐款,您将获得双倍的快速下载次数。

🐢 低速下载

由可信的合作方提供。 更多信息请参见常见问题解答。 (可能需要验证浏览器——无限次下载!)

所有选项下载的文件都相同,应该可以安全使用。即使这样,从互联网下载文件时始终要小心。例如,确保您的设备更新及时。
  • 对于大文件,我们建议使用下载管理器以防止中断。
    推荐的下载管理器:JDownloader
  • 您将需要一个电子书或 PDF 阅读器来打开文件,具体取决于文件格式。
    推荐的电子书阅读器:Anna的档案在线查看器ReadEraCalibre
  • 使用在线工具进行格式转换。
    推荐的转换工具:CloudConvertPrintFriendly
  • 您可以将 PDF 和 EPUB 文件发送到您的 Kindle 或 Kobo 电子阅读器。
    推荐的工具:亚马逊的“发送到 Kindle”djazz 的“发送到 Kobo/Kindle”
  • 支持作者和图书馆
    ✍️ 如果您喜欢这个并且能够负担得起,请考虑购买原版,或直接支持作者。
    📚 如果您当地的图书馆有这本书,请考虑在那里免费借阅。