Optimizing information security and advancing privacy assurance : new technologies /

"This book reviews issues and trends in security and privacy at an individual user level, as well as within global enterprises, covering enforcement of existing security technologies, factors driving their use, and goals for ensuring the continued security of information systems"--Provided...

Full description

Saved in:
Bibliographic Details
Corporate Authors: IGI Global
Group Author: Nemati, Hamid R., 1958- (Editor)
Published: IGI Global,
Publisher Address: Hershey, Pa. :
Publication Dates: 2012.
Literature type: eBook
Language: English
Subjects:
Online Access: http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-0026-3
Summary: "This book reviews issues and trends in security and privacy at an individual user level, as well as within global enterprises, covering enforcement of existing security technologies, factors driving their use, and goals for ensuring the continued security of information systems"--Provided by publisher.
Carrier Form: PDFs (294 pages) : illustrations
Bibliography: Includes bibliographical references.
ISBN: 9781466600270 (ebook)
Access: Restricted to subscribers or individual electronic text purchasers.
Index Number: QA76
CLC: TP309-532
Contents: 1. Provable security for outsourcing database operations / Sergei Evdokimov, Matthias Fischmann and Oliver G unther -- 2. A host-based intrusion detection system using architectural features to improve sophisticated denial-of-service attack detections / Ran Tao ... [et al.] -- 3. A keystroke biometric system for long-text input / Charles C. Tappert ... [et al.] -- 4. A six-view perspective framework for system security: issues, risks, and requirements / Surya B. Yadav -- 5. Are online privacy policies readable? / M. Sumeeth, R.I. Singh and J. Miller -- 6. Protecting user privacy better with query l-diversity / Fuyu Liu and Kien A. Hua -- 7. Globalization and data privacy: an exploratory study / Robert L. Totterdale -- 8. Security issues for cloud computing / Kevin Hamlen, Murat Kantarcioglu, Latifur Khan and Bhavani Thuraisingham -- 9. Global information security factors / Garry White and Ju Long -- 10. The integrated privacy model: building a privacy model in the business processes of the enterprise / Munir Majdalawieh -- 11. Policy enforcement system for inter-organizational data sharing / Mamoun Awad, Latifur Khan and Bhavani Thuraisingham -- 12. Goals and practices in maintaining information systems security / Zippy Erlich and Moshe Zviran -- 13. Factors influencing college students' use of computer security / Norman Pendegraft and Robert W. Stone -- 14. A game theoretic approach to optimize identity exposure in pervasive computing environments / Feng W. Zhu, Sandra Carpenter, Wei Zhu and Matt Mutka -- 15. Hiding message in map along pre-Hamiltonian path / Sunil Kumar Muttoo and Vinay Kumar -- 16. Probabilistic inference channel detection and restriction applied to patients' privacy assurance / Bandar Alhaqbani and Colin Fidge.