You are previewing Optimizing Information Security and Advancing Privacy Assurance.
O'Reilly logo
Optimizing Information Security and Advancing Privacy Assurance

Book Description

Optimizing Information Security and Advancing Privacy Assurance: New Technologies reviews issues and trends in security and privacy at an individual user level, as well as within global enterprises. Enforcement of existing security technologies, factors driving their use, and goals for ensuring the continued security of information systems are discussed in this multidisciplinary collection of research, with the primary aim being the continuation and promotion of methods and theories in this far-reaching discipline.

Table of Contents

  1. Cover
  2. Title Page
  3. Copyright Page
  4. PREFACE
  5. Chapter 1: Provable Security for Outsourcing Database Operations
    1. Abstract
    2. INTRODUCTION
    3. RELATED WORK AND RELEVANT NOTIONS OF SECURITY
    4. A SECURITY ANALYSIS OF DATABASE PRIVACY HOMOMORPHISMS
    5. PRIVACY HOMOMORPHIC EXACT SELECT
    6. DISCUSSION AND REMARKS
    7. CONCLUSION AND FUTURE WORK
  6. Chapter 2: A Host-Based Intrusion Detection System Using Architectural Features to Improve Sophisticated Denial-of-Service Attack Detections
    1. Abstract
    2. INTRODUCTION
    3. Related Work
    4. The IDS Framework
    5. Experimental Results
    6. Conclusion
  7. Chapter 3: A Keystroke Biometric System for Long-Text Input
    1. ABSTRACT
    2. INTRODUCTION
    3. KEYSTROKE BIOMETRIC SYSTEM
    4. Receiver Operating Characteristic (ROC) Curve Derivation
    5. EXPERIMENTAL DESIGN AND DATA COLLECTION
    6. EXPERIMENTAL RESULTS
    7. CONCLUSION AND FUTURE WORK
    8. APPENDIX: Summary of the 239 Features
  8. Chapter 4: A Six-View Perspective Framework for System Security
    1. Abstract
    2. I. Introduction
    3. II. Current Literature on System Security
    4. III. Six-View Perspective of System Security—A Unified Framework
    5. V. Contributions of the SVPSS Framework to the IS Literature
    6. VI. Limitations of SVPSS Framework
    7. VII. Conclusion and Future Research
    8. Appendix A
  9. Chapter 5: Are Online Privacy Policies Readable?
    1. Abstract
    2. 1. Introduction
    3. 2. Privacy policies: Their requirements and restrictions
    4. 3. Requirements of Human Readable Policies
    5. 4. Readability Evaluation Methods
    6. 5. PREVIOUS INVESTIGATIONS
    7. Conclusion
    8. 6. Readability Evaluation Methodology for this Study
    9. 8. Discussion and Conclusion
  10. Chapter 6: Protecting User Privacy Better with Query l-Diversity
    1. Abstract
    2. 1 Introduction
    3. 2. Related Work
    4. 3. Preliminaries
    5. 4. Cloaking Algorithms
    6. 5. Performance Study
    7. 6. Conclusion
  11. Chapter 7: Globalization and Data Privacy
    1. Abstract
    2. Introduction
    3. Literature Review and Company Background
    4. Methodology
    5. Results
    6. Conclusion
  12. Chapter 8: Security Issues for Cloud Computing
    1. Abstract
    2. Introduction
    3. Security Issues for Clouds
    4. Third Party Secure Data Publication Applied to Cloud
    5. Encrypted Data Storage for Cloud
    6. Secure Query Processing with Hadoop
    7. Summary and Conclusion
  13. Chapter 9: Global Information Security Factors
    1. Abstract
    2. Introduction
    3. Literature Review
    4. Method
    5. Results
    6. Conclusion
  14. Chapter 10: The Integrated Privacy Model
    1. Abstract
    2. Introduction
    3. Analysis of the Current Status of Privacy
    4. Data Protection Solutions in the Enterprise
    5. Advanced Business-Centric Personal Data Management Systems
    6. Integrating the ABC-PDMS in the Enterprise
    7. Implications for Practice and Future Research
    8. Conclusion
  15. Chapter 11: Policy Enforcement System for Inter-Organizational Data Sharing
    1. Abstract
    2. 1. Introduction
    3. 2. Data Partitioning
    4. 3. Policy Representation and Enforcement
    5. 4. Data Sharing
    6. 5. Summary and Future Considerations
    7. Appendix
  16. Chapter 12: Goals and Practices in Maintaining Information Systems Security
    1. Abstract
    2. Introduction
    3. Main Goals of Information Systems Security
    4. User Authentication and Access Control
    5. Intrusion Detection and Prevention Systems
    6. Summary and Conclusion
  17. Chapter 13: Factors Influencing College Students’ Use of Computer Security
    1. Abstract
    2. Introduction
    3. The Theoretical Model
    4. The Empirical Study
    5. Discussion and Policy Implications
    6. Conclusion
  18. Chapter 14: A Game Theoretic Approach to Optimize Identity Exposure in Pervasive Computing Environments
    1. Abstract
    2. Introduction
    3. Related Work
    4. The Hierarchical Identity Model
    5. Finding the Proper Identity to Expose
    6. Using the Hierarchical Identity Model to Build an Exposure Game
    7. Prototype Design and Implementation
    8. Evaluation and Experiments
    9. Conclusion and Future Work
  19. Chapter 15: Hiding Message in Map Along Pre-Hamiltonian Path
    1. Abstract
    2. 1. Introduction
    3. 2. Data Structure for Vector Map
    4. 3. Embedding Algorithm
    5. 4. Extraction Algorithm
    6. 5. Implementation
    7. 6. Steganalysis
    8. 7. Conclusion
  20. Chapter 16: Probabilistic Inference Channel Detection and Restriction Applied to Patients’ Privacy Assurance
    1. Abstract
    2. Introduction
    3. Background
    4. Related Work
    5. Medical Data Resources
    6. Medical Data Relations
    7. Probabilistic Inference Channel Detection and Restriction
    8. Privacy-Preserving Data Disclosure
    9. Algorithm
    10. Implementation
    11. Case Scenario
    12. Conclusion and Future Work
  21. Compilation of References
  22. About the Contributors
  23. Index