skip to content
Covid-19 virus
COVID-19 Resources

Reliable information about the coronavirus (COVID-19) is available from the World Health Organization (current situation, international travel). Numerous and frequently-updated resource results are available from this WorldCat.org search. OCLC’s WebJunction has pulled together information and resources to assist library staff as they consider how to handle coronavirus issues in their communities.

Image provided by: CDC/ Alissa Eckert, MS; Dan Higgins, MAM
Detection and mitigation of insider attacks in a cloud infrastructure : emerging research and opportunities Preview this item
ClosePreview this item
Checking...

Detection and mitigation of insider attacks in a cloud infrastructure : emerging research and opportunities

Author: T Gunasekhar
Publisher: Hershey, PA : IGI Global, Information Science Reference, an imprint of IGI Global, [2019] ©2019
Series: Advances in information security, privacy, and ethics (AISPE) book series.
Edition/Format:   eBook : Document : EnglishView all editions and formats
Summary:
"This book looks at the security vulnerabilities associated with consumer virtual machines. It focuses on crucial challenge of ensuring the data confidentiality and integrity for the arbitrary software execution of consumer virtual machines. It also contains an empirical method to accumulate evidences of security flaws in existence methods and implemented a prototype to prevent and detect attacks"--
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy online

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Additional Physical Format: Print version:
Gunasekhar, T., 1990-
Detection and mitigation of insider attacks in a cloud infrastructure.
Hershey, PA : IGI Global, Information Science Reference, an imprint of IGI Global, [2019]
(DLC) 2018038726
(OCoLC)1049574890
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: T Gunasekhar
ISBN: 9781522579250 1522579257
OCLC Number: 1083341921
Notes: "Premier reference source"
Description: 1 online resource (xxxvi, 113 pages)
Contents: 1. Security architecture of cloud computing --
2. Trusted cloud computing --
3. A survey on insider attacks in IAAS-based cloud --
4. Security flaws and design issues in cloud infrastructure --
5. Trustworthy framework for insider attack prevention and detection --
6. Results and discussions.
Series Title: Advances in information security, privacy, and ethics (AISPE) book series.
Responsibility: T. Gunasekhar, K. Thirupathi Rao, P. Sai Kiran, V. Krishna Reddy, B. Thirumala Rao.

Abstract:

Discusses maintaining a secure management of sensitive data, and intellectual property and provides a robust security algorithm on consumer data. Featuring research on topics such as public  Read more...

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


\n\n

Primary Entity<\/h3>\n
<http:\/\/www.worldcat.org\/oclc\/1083341921<\/a>> # Detection and mitigation of insider attacks in a cloud infrastructure : emerging research and opportunities<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:MediaObject<\/a>, schema:Book<\/a>, schema:CreativeWork<\/a> ;\u00A0\u00A0\u00A0\nlibrary:oclcnum<\/a> \"1083341921<\/span>\" ;\u00A0\u00A0\u00A0\nlibrary:placeOfPublication<\/a> <http:\/\/id.loc.gov\/vocabulary\/countries\/pau<\/a>> ;\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/dewey.info\/class\/004.6782\/e23\/<\/a>> ;\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/5396603247#Topic\/computers_computer_literacy<\/a>> ; # COMPUTERS \/ Computer Literacy<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/5396603247#Topic\/computer_crimes_prevention<\/a>> ; # Computer crimes--Prevention<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/5396603247#Topic\/computers_machine_theory<\/a>> ; # COMPUTERS \/ Machine Theory<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/5396603247#Topic\/cloud_computing_security_measures<\/a>> ; # Cloud computing--Security measures<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/5396603247#Topic\/computers_computer_science<\/a>> ; # COMPUTERS \/ Computer Science<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/5396603247#Topic\/computers_hardware_general<\/a>> ; # COMPUTERS \/ Hardware \/ General<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/5396603247#Topic\/computers_information_technology<\/a>> ; # COMPUTERS \/ Information Technology<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/5396603247#Topic\/computers_reference<\/a>> ; # COMPUTERS \/ Reference<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/5396603247#Topic\/computers_data_processing<\/a>> ; # COMPUTERS \/ Data Processing<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/5396603247#Topic\/virtual_computer_systems_security_measures<\/a>> ; # Virtual computer systems--Security measures<\/span>\n\u00A0\u00A0\u00A0\nschema:author<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/5396603247#Person\/gunasekhar_t_1990<\/a>> ; # T. Gunasekhar<\/span>\n\u00A0\u00A0\u00A0\nschema:bookFormat<\/a> schema:EBook<\/a> ;\u00A0\u00A0\u00A0\nschema:copyrightYear<\/a> \"2019<\/span>\" ;\u00A0\u00A0\u00A0\nschema:datePublished<\/a> \"2019<\/span>\" ;\u00A0\u00A0\u00A0\nschema:description<\/a> \"1. Security architecture of cloud computing -- 2. Trusted cloud computing -- 3. A survey on insider attacks in IAAS-based cloud -- 4. Security flaws and design issues in cloud infrastructure -- 5. Trustworthy framework for insider attack prevention and detection -- 6. Results and discussions.<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:description<\/a> \"\"This book looks at the security vulnerabilities associated with consumer virtual machines. It focuses on crucial challenge of ensuring the data confidentiality and integrity for the arbitrary software execution of consumer virtual machines. It also contains an empirical method to accumulate evidences of security flaws in existence methods and implemented a prototype to prevent and detect attacks\"--<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:exampleOfWork<\/a> <http:\/\/worldcat.org\/entity\/work\/id\/5396603247<\/a>> ;\u00A0\u00A0\u00A0\nschema:genre<\/a> \"Electronic books<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:inLanguage<\/a> \"en<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isPartOf<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/5396603247#Series\/advances_in_information_security_privacy_and_ethics_aispe_book_series<\/a>> ; # Advances in information security, privacy, and ethics (AISPE) book series.<\/span>\n\u00A0\u00A0\u00A0\nschema:isSimilarTo<\/a> <http:\/\/www.worldcat.org\/oclc\/1049574890<\/a>> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Detection and mitigation of insider attacks in a cloud infrastructure : emerging research and opportunities<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:productID<\/a> \"1083341921<\/span>\" ;\u00A0\u00A0\u00A0\nschema:url<\/a> <http:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/978-1-5225-7924-3<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <http:\/\/search.ebscohost.com\/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=2007179<\/a>> ;\u00A0\u00A0\u00A0\nschema:workExample<\/a> <http:\/\/worldcat.org\/isbn\/9781522579250<\/a>> ;\u00A0\u00A0\u00A0\nwdrs:describedby<\/a> <http:\/\/www.worldcat.org\/title\/-\/oclc\/1083341921<\/a>> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n\n

Related Entities<\/h3>\n
<http:\/\/dewey.info\/class\/004.6782\/e23\/<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/5396603247#Person\/gunasekhar_t_1990<\/a>> # T. Gunasekhar<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Person<\/a> ;\u00A0\u00A0\u00A0\nschema:birthDate<\/a> \"1990<\/span>\" ;\u00A0\u00A0\u00A0\nschema:familyName<\/a> \"Gunasekhar<\/span>\" ;\u00A0\u00A0\u00A0\nschema:givenName<\/a> \"T.<\/span>\" ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"T. Gunasekhar<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/5396603247#Series\/advances_in_information_security_privacy_and_ethics_aispe_book_series<\/a>> # Advances in information security, privacy, and ethics (AISPE) book series.<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nbgn:PublicationSeries<\/a> ;\u00A0\u00A0\u00A0\nschema:hasPart<\/a> <http:\/\/www.worldcat.org\/oclc\/1083341921<\/a>> ; # Detection and mitigation of insider attacks in a cloud infrastructure : emerging research and opportunities<\/span>\n\u00A0\u00A0\u00A0\nschema:name<\/a> \"Advances in information security, privacy, and ethics (AISPE) book series.<\/span>\" ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Advances in information security, privacy, and ethics (AISPE) book series<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/5396603247#Topic\/cloud_computing_security_measures<\/a>> # Cloud computing--Security measures<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Cloud computing--Security measures<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/5396603247#Topic\/computer_crimes_prevention<\/a>> # Computer crimes--Prevention<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Computer crimes--Prevention<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/5396603247#Topic\/computers_computer_literacy<\/a>> # COMPUTERS \/ Computer Literacy<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"COMPUTERS \/ Computer Literacy<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/5396603247#Topic\/computers_computer_science<\/a>> # COMPUTERS \/ Computer Science<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"COMPUTERS \/ Computer Science<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/5396603247#Topic\/computers_data_processing<\/a>> # COMPUTERS \/ Data Processing<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"COMPUTERS \/ Data Processing<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/5396603247#Topic\/computers_hardware_general<\/a>> # COMPUTERS \/ Hardware \/ General<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"COMPUTERS \/ Hardware \/ General<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/5396603247#Topic\/computers_information_technology<\/a>> # COMPUTERS \/ Information Technology<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"COMPUTERS \/ Information Technology<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/5396603247#Topic\/computers_machine_theory<\/a>> # COMPUTERS \/ Machine Theory<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"COMPUTERS \/ Machine Theory<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/5396603247#Topic\/computers_reference<\/a>> # COMPUTERS \/ Reference<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"COMPUTERS \/ Reference<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/5396603247#Topic\/virtual_computer_systems_security_measures<\/a>> # Virtual computer systems--Security measures<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Virtual computer systems--Security measures<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/id.loc.gov\/vocabulary\/countries\/pau<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:Place<\/a> ;\u00A0\u00A0\u00A0\ndcterms:identifier<\/a> \"pau<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/worldcat.org\/isbn\/9781522579250<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:ProductModel<\/a> ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"1522579257<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"9781522579250<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/www.worldcat.org\/oclc\/1049574890<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:CreativeWork<\/a> ;\u00A0\u00A0\u00A0\nrdfs:label<\/a> \"Detection and mitigation of insider attacks in a cloud infrastructure.<\/span>\" ;\u00A0\u00A0\u00A0\nschema:description<\/a> \"Print version:<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isSimilarTo<\/a> <http:\/\/www.worldcat.org\/oclc\/1083341921<\/a>> ; # Detection and mitigation of insider attacks in a cloud infrastructure : emerging research and opportunities<\/span>\n\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/www.worldcat.org\/title\/-\/oclc\/1083341921<\/a>>\u00A0\u00A0\u00A0\u00A0a \ngenont:InformationResource<\/a>, genont:ContentTypeGenericResource<\/a> ;\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/www.worldcat.org\/oclc\/1083341921<\/a>> ; # Detection and mitigation of insider attacks in a cloud infrastructure : emerging research and opportunities<\/span>\n\u00A0\u00A0\u00A0\nschema:dateModified<\/a> \"2019-05-16<\/span>\" ;\u00A0\u00A0\u00A0\nvoid:inDataset<\/a> <http:\/\/purl.oclc.org\/dataset\/WorldCat<\/a>> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n\n

Content-negotiable representations<\/p>\n