Authors Lombardi and Di Pietro present students, academics, and IT professionals working in a wide variety of contexts with a comprehensive examination of contemporary cloud computing security issues.
With continuous growth in the number of information objects and the users that can access these objects, ensuring that access is compliant with company policies has become a big challenge. Role-based
To defend against computer and network attacks, multiple, complementary security devices such as intrusion detection systems (IDSs), and firewalls are widely deployed to monitor networks and hosts. Th
This volume presents the refereed proceedings of the 8th International ICST Conference on Security and Privacy in Communication Networks, SecureComm 2012, held in Padua, Italy, in September 2012. The
This book constitutes the thoroughly refereed joint post proceedings of two international workshops, the 7th International Workshop on Data Privacy Management, DPM 2012, and the 5th International Work
This book constitutes the thoroughly refereed post-conference proceedings of the 11th International Meeting on Computational Intelligence Methods for Bioinformatics and Biostatistics, CIBB 2014, held