|
|
Showing 1 - 7 of
7 matches in All Departments
Cloud Computing has already been embraced by many organizations and
individuals due to its benefits of economy, reliability,
scalability and guaranteed quality of service among others. But
since the data is not stored, analysed or computed on site, this
can open security, privacy, trust and compliance issues. This
one-stop reference covers a wide range of issues on data security
in Cloud Computing ranging from accountability, to data provenance,
identity and risk management. Data Security in Cloud Computing
covers major aspects of securing data in Cloud Computing. Topics
covered include NOMAD: a framework for ensuring data
confidentiality in mission-critical cloud based applications;
3DCrypt: privacy-preserving pre-classification volume ray-casting
of 3D images in the cloud; multiprocessor system-on-chip for
processing data in Cloud Computing; distributing encoded data for
private processing in the cloud; data protection and mobility
management for cloud; understanding software defined perimeter;
security, trust and privacy for Cloud Computing in transportation
cyber-physical systems; review of data leakage attack techniques in
cloud systems; Cloud Computing and personal data processing:
sorting out legal requirements; the Waikato data privacy matrix;
provenance reconstruction in clouds; and security visualization for
Cloud Computing.
Drawing upon the expertise of world-renowned researchers and
experts, The Cloud Security Ecosystem comprehensively discusses a
range of cloud security topics from multi-disciplinary and
international perspectives, aligning technical security
implementations with the most recent developments in business,
legal, and international environments. The book holistically
discusses key research and policy advances in cloud security -
putting technical and management issues together with an in-depth
treaties on a multi-disciplinary and international subject. The
book features contributions from key thought leaders and top
researchers in the technical, legal, and business and management
aspects of cloud security. The authors present the leading edge of
cloud security research, covering the relationships between
differing disciplines and discussing implementation and legal
challenges in planning, executing, and using cloud security.
This book highlights the challenges and potential of educational
learning or industry-based training using serious games and social
media platforms. In particular, the book addresses applications
used in businesses and education-related organizations in Asia,
where the framework and experience of serious games have been used
to address specific problems in the real world. The topics that
will be present in this book includes future of serious games and
immersive technologies and their impact on society; online and
mobile games; achievement systems in serious games; persuasive
technology and games for saving and money management; malware
analytics for social networking; serious games for mental health
interventions; educational implications of social network games;
learning and acquiring subject knowledge using serious games in
classrooms. The target audience for this book includes scientists,
engineers and practitioners involved in the field of Serious Games.
The major part of this book comprises of papers that have been
presented at the Serious Games and Social Connect 2012 conference
held in Singapore (October 4, 2012). All the contributions have
been peer reviewed and by scientific committee members with report
about quality, content and originality.
|
Security in Computing and Communications - 4th International Symposium, SSCC 2016, Jaipur, India, September 21-24, 2016, Proceedings (Paperback, 1st ed. 2016)
Peter Mueller, Sabu M. Thampi, Md Zakirul Alam Bhuiyan, Ryan Ko, Robin Doss, …
|
R2,671
Discovery Miles 26 710
|
Ships in 18 - 22 working days
|
This book constitutes the refereed proceedings of the 4th
International Symposium on Security in Computing and
Communications, SSCC 2016, held in Jaipur, India, in September
2016. The 23 revised full papers presented together with 16 short
papers and an invited paper were carefully reviewed and selected
from 136 submissions. The papers are organized in topical sections
on cryptosystems, algorithms, primitives; security and privacy in
networked systems; system and network security; steganography,
visual cryptography, image forensics; applications security.
This book highlights the challenges and potential of educational
learning or industry-based training using serious games and social
media platforms. In particular, the book addresses applications
used in businesses and education-related organizations in Asia,
where the framework and experience of serious games have been used
to address specific problems in the real world. The topics that
will be present in this book includes future of serious games and
immersive technologies and their impact on society; online and
mobile games; achievement systems in serious games; persuasive
technology and games for saving and money management; malware
analytics for social networking; serious games for mental health
interventions; educational implications of social network games;
learning and acquiring subject knowledge using serious games in
classrooms. The target audience for this book includes scientists,
engineers and practitioners involved in the field of Serious Games.
The major part of this book comprises of papers that have been
presented at the Serious Games and Social Connect 2012 conference
held in Singapore (October 4, 2012). All the contributions have
been peer reviewed and by scientific committee members with report
about quality, content and originality.
|
Recent Trends in Computer Networks and Distributed Systems Security - Second International Conference, SNDS 2014, Trivandrum, India, March 13-14, 2014. Proceedings (Paperback, 2014 ed.)
Gregorio Martinez Perez, Sabu M. Thampi, Ryan Ko, Lei Shu
|
R2,904
Discovery Miles 29 040
|
Ships in 18 - 22 working days
|
This book constitutes the refereed proceedings of the Second
International Conference on Security in Computer Networks and
Distributed Systems, SNDS 2014, held in Trivandrum, India, in March
2014. The 32 revised full papers presented together with 9 short
papers and 8 workshop papers were carefully reviewed and selected
from 129 submissions. The papers are organized in topical sections
on security and privacy in networked systems; multimedia security;
cryptosystems, algorithms, primitives; system and network security;
short papers. The workshop papers were presented at the following
workshops: Second International Workshop on Security in
Self-Organising Networks (Self Net 2014); Workshop on
Multidisciplinary Perspectives in Cryptology and Information
Security (CIS 2014); Second International Workshop on Trust and
Privacy in Cyberspace (Cyber Trust 2014).
|
Security in Computing and Communications - 8th International Symposium, SSCC 2020, Chennai, India, October 14-17, 2020, Revised Selected Papers (Paperback, 1st ed. 2021)
Sabu M. Thampi, Guojun Wang, Danda B. Rawat, Ryan Ko, Chun I. Fan
|
R1,295
Discovery Miles 12 950
|
Ships in 10 - 15 working days
|
This book constitutes revised selected papers of the 8th
International Symposium on Security in Computing and
Communications, SSCC 2020, held in Chennai, India, in October 2020.
Due to the COVID-19 pandemic the conference was held online. The 13
revised full papers and 8 revised short papers presented were
carefully reviewed and selected from 42 submissions. The papers
cover wide research fields including cryptography, database and
storage security, human and societal aspects of security and
privacy.
|
|