Optimizing information security and advancing privacy assurance new technologies /

"This book reviews issues and trends in security and privacy at an individual user level, as well as within global enterprises, covering enforcement of existing security technologies, factors driving their use, and goals for ensuring the continued security of information systems"--Provided...

Full description

Bibliographic Details
Corporate Author: IGI Global.
Other Authors: Nemati, Hamid R., 1958-
Format: Electronic
Language:English
Published: Hershey, Pa. : IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA), c2012.
Subjects:
Online Access:Chapter PDFs via platform:
LEADER 04294nam a2200577 a 4500
001 19492
003 IGIG
005 20120130005716.0
006 m e d
007 cr bn||||m|||a
008 120123s2012 pau fsb 000 0 eng d
010 # # |z 2011049414 
020 # # |a 9781466600270 (ebook) 
020 # # |z 9781466600263 (hbk.) 
020 # # |z 9781466600287 (print & perpetual access) 
024 7 # |a 10.4018/978-1-4666-0026-3  |2 doi 
035 # # |a (CaBNVSL)gtp00550662 
035 # # |a (OCoLC)807848376 
040 # # |a CaBNVSL  |c CaBNVSL  |d CaBNVSL 
050 # 4 |a QA76.9.A25  |b O685 2012e 
082 0 4 |a 005.8  |2 23 
245 0 0 |a Optimizing information security and advancing privacy assurance  |b new technologies /  |c Hamid R. Nemati, editor.  |h [electronic resource] : 
260 # # |a Hershey, Pa. :  |b IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA),  |c c2012. 
300 # # |a electronic texts (294 p.) :  |b digital files. 
504 # # |a Includes bibliographical references. 
505 0 # |a 1. Provable security for outsourcing database operations / Sergei Evdokimov, Matthias Fischmann and Oliver Günther -- 2. A host-based intrusion detection system using architectural features to improve sophisticated denial-of-service attack detections / Ran Tao ... [et al.] -- 3. A keystroke biometric system for long-text input / Charles C. Tappert ... [et al.] -- 4. A six-view perspective framework for system security: issues, risks, and requirements / Surya B. Yadav -- 5. Are online privacy policies readable? / M. Sumeeth, R.I. Singh and J. Miller -- 6. Protecting user privacy better with query l-diversity / Fuyu Liu and Kien A. Hua -- 7. Globalization and data privacy: an exploratory study / Robert L. Totterdale -- 8. Security issues for cloud computing / Kevin Hamlen, Murat Kantarcioglu, Latifur Khan and Bhavani Thuraisingham -- 9. Global information security factors / Garry White and Ju Long -- 10. The integrated privacy model: building a privacy model in the business processes of the enterprise / Munir Majdalawieh -- 11. Policy enforcement system for inter-organizational data sharing / Mamoun Awad, Latifur Khan and Bhavani Thuraisingham -- 12. Goals and practices in maintaining information systems security / Zippy Erlich and Moshe Zviran -- 13. Factors influencing college students' use of computer security / Norman Pendegraft and Robert W. Stone -- 14. A game theoretic approach to optimize identity exposure in pervasive computing environments / Feng W. Zhu, Sandra Carpenter, Wei Zhu and Matt Mutka -- 15. Hiding message in map along pre-Hamiltonian path / Sunil Kumar Muttoo and Vinay Kumar -- 16. Probabilistic inference channel detection and restriction applied to patients' privacy assurance / Bandar Alhaqbani and Colin Fidge. 
506 # # |a Restricted to subscribers or individual electronic text purchasers. 
520 3 # |a "This book reviews issues and trends in security and privacy at an individual user level, as well as within global enterprises, covering enforcement of existing security technologies, factors driving their use, and goals for ensuring the continued security of information systems"--Provided by publisher. 
530 # # |a Also available in print. 
538 # # |a Mode of access: World Wide Web. 
588 # # |a Description based on title screen (IGI Global, viewed January 23, 2012). 
650 # 0 |a Computer security. 
650 # 0 |a Information technology  |x Security measures. 
650 # 0 |a Computer networks  |x Security measures. 
650 # 0 |a Data protection. 
653 # # |a Biometrics 
653 # # |a Cloud computing and security 
653 # # |a Global information security 
653 # # |a Information security perspectives 
653 # # |a Inter-organizational data sharing 
653 # # |a Intrusion detection systems 
653 # # |a Online privacy policies 
653 # # |a Outsourcing and security 
653 # # |a Privacy in enterprises 
653 # # |a User privacy 
700 1 # |a Nemati, Hamid R.,  |d 1958- 
710 2 # |a IGI Global. 
776 0 # |c (Original)  |w (DLC)2011049414 
776 0 8 |i Print version:  |w (DLC) 2011049414  |z 9781466600263  |z 1466600268 
856 4 1 |u https://ezaccess.library.uitm.edu.my/login?url=http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-0026-3  |3 Chapter PDFs via platform: