|
Showing 1 - 5 of
5 matches in All Departments
This book presents cybersecurity aspects of ubiquitous and growing
IoT and Cyber Physical Systems. It also introduces a range of
conceptual, theoretical, and foundational access control solutions.
This was developed by the authors to provide an overall broader
perspective and grounded approach to solve access control problems
in IoT and CPS. The authors discuss different architectures,
frameworks, access control models, implementation scenarios, and a
broad set of use-cases in different IoT and CPS domains. This
provides readers an intuitive and easy to read set of chapters. The
authors also discuss IoT and CPS access control solutions provided
by key industry players including Amazon Web Services (AWS) and
Google Cloud Platform (GCP). It provides extensions of the authors
proposed fine grained solutions with these widely used cloud and
edge supported platforms. This book is designed to serve the
computer science and the cybersecurity community including
researchers, academicians and students. Practitioners who have a
wider interest in IoT, CPS, privacy and security aspects will also
find this book useful. Thanks to the holistic planning and
thoughtful organization of this book, the readers are expected to
gain in-depth knowledge of the state-of-the-art access control
architectures and security models for resilient IoT and CPS.
The purpose of this book is to discuss, in depth, the current state
of research and practice in database security, to enable readers to
expand their knowledge. The book brings together contributions from
experts in the field throughout the world. Database security is
still a key topic in mist businesses and in the public sector,
having implications for the whole of society.
|
Network and System Security - 7th International Conference, NSS 2013, Madrid, Spain, June 3-4, 2013, Proceedings (Paperback, 2013 ed.)
Javier Lopez, Xinyi Huang, Ravi Sandhu
|
R1,621
Discovery Miles 16 210
|
Ships in 10 - 15 working days
|
This book constitutes the proceedings of the 7th International
Conference on Network and System Security, NSS 2013, held in
Madrid, Spain, in June 2013. The 41 full papers presented were
carefully reviewed and selected from 176 submissions. The volume
also includes 7 short papers and 13 industrial track papers. The
paper are organized in topical sections on network security
(including: modeling and evaluation; security protocols and
practice; network attacks and defense) and system security
(including: malware and intrusions; applications security; security
algorithms and systems; cryptographic algorithms; privacy; key
agreement and distribution).
This volume contains papers from the OOPSLA-93 Conference Workshop
on Security for Object-Oriented Systems, held in Washington DC,
USA, on 26 September 1993. The workshop addressed the issue of how
to introduce an acceptable level of security into object-oriented
systems, as the use of such systems becomes increasingly
widespread. The topic is approached from two different, but
complementary, viewpoints: the incorporation of security into
object-oriented systems, and the use of object-oriented design and
modelling techniques for designing secure applications. The papers
cover a variety of issues, relating to both mandatory and
discretionary security, including security facilities of PCTE,
information flow control, the design of multilevel secure data
models, and secure database interoperation via role translation.
The resulting volume provides a comprehensive overview of current
work in this important area of research.
|
You may like...
Loot
Nadine Gordimer
Paperback
(2)
R383
R310
Discovery Miles 3 100
Workplace law
John Grogan
Paperback
R900
R820
Discovery Miles 8 200
Ab Wheel
R209
R149
Discovery Miles 1 490
Dune: Part 1
Timothee Chalamet, Rebecca Ferguson, …
Blu-ray disc
(4)
R631
Discovery Miles 6 310
|