Tekijänoikeuden erikoiskirjasto

Security and privacy in internet of things (IoTs) : models, algorithms, and implementations
Muistilista on tyhjä
Vis
Hylly
  • SECURITY 61.72
Nimeke- ja vastuullisuusmerkintö
  • Security and privacy in internet of things (IoTs) : models, algorithms, and implementations
Julkaistu
  • CRC Press, Boca Raton : 2016.
SAB-luokituskoodi
  • 61.72
Muu luokituskoodi
  • 61.72
Ulkoasutiedot
  • xx, 584.
Huomautus sisällöstä, tiivistelmä tms.
  • The Internet of Things (IoT) has attracted strong interest from both academia and industry. Unfortunately, it has also attracted the attention of hackers. Security and Privacy in Internet of Things (IoTs): Models, Algorithms, and Implementations brings together some of the top IoT security experts from around the world who contribute their knowledge regarding different IoT security aspects. It answers the question "How do we use efficient algorithms, models, and implementations to cover the four important aspects of IoT security, i.e., confidentiality, authentication, integrity, and availability?" The book consists of five parts covering attacks and threats, privacy preservation, trust and authentication, IoT data security, and social awareness. The first part introduces all types of IoT attacks and threats and demonstrates the principle of countermeasures against those attacks. It provides detailed introductions to specific attacks such as malware propagation and Sybil attacks. The second part addresses privacy-preservation issues related to the collection and distribution of data, including medical records.The author uses smart buildings as an example to discuss privacy-protection solutions. The third part describes different types of trust models in the IoT infrastructure, discusses access control to IoT data, and provides a survey of IoT authentication issues. The fourth part emphasizes security issues during IoT data computation. It introduces computational security issues in IoT data processing, security design in time series data aggregation, key generation for data transmission, and concrete security protocols during data access. The fifth and final part considers policy and human behavioral features and covers social-context-based privacy and trust design in IoT platforms as well as policy-based informed consent in the IoT.
Asiasana - Kontrolloimaton
Henkilönnimi
  • Hu, Fei.
ISBN
  • 978-1-4987-2318-3
*00002730nam a22003014a 4500
*00110740
*00520201106111827.0
*008160810s2016\\\\xx\||||||||||\||||||eng|c
*020  $a978-1-4987-2318-3
*035  $a23420
*035  $a(PLib-conv)0000023420
*0410 $aeng
*084  $a61.72$2ykl
*24500$aSecurity and privacy in internet of things (IoTs) :$bmodels, algorithms, and implementations /$cFei Hu (ed.).
*260  $aBoca Raton :$bCRC Press,$c2016.
*300  $axx, 584.
*520  $aThe Internet of Things (IoT) has attracted strong interest from both academia and industry. Unfortunately, it has also attracted the attention of hackers. Security and Privacy in Internet of Things (IoTs): Models, Algorithms, and Implementations brings together some of the top IoT security experts from around the world who contribute their knowledge regarding different IoT security aspects. It answers the question "How do we use efficient algorithms, models, and implementations to cover the four important aspects of IoT security, i.e., confidentiality, authentication, integrity, and availability?" The book consists of five parts covering attacks and threats, privacy preservation, trust and authentication, IoT data security, and social awareness. The first part introduces all types of IoT attacks and threats and demonstrates the principle of countermeasures against those attacks. It provides detailed introductions to specific attacks such as malware propagation and Sybil attacks. The second part addresses privacy-preservation issues related to the collection and distribution of data, including medical records.The author uses smart buildings as an example to discuss privacy-protection solutions. The third part describes different types of trust models in the IoT infrastructure, discusses access control to IoT data, and provides a survey of IoT authentication issues. The fourth part emphasizes security issues during IoT data computation. It introduces computational security issues in IoT data processing, security design in time series data aggregation, key generation for data transmission, and concrete security protocols during data access. The fifth and final part considers policy and human behavioral features and covers social-context-based privacy and trust design in IoT platforms as well as policy-based informed consent in the IoT.
*653  $aSUOJAUS
*653  $aTURVALLISUUS
*653  $aESINEIDEN INTERNET
*653  $aENNALTAEHKÄISY
*653  $aYKSITYISYYS
*653  $aYKSILÖNSUOJA
*653  $aTIETOTEKNIIKKA
*653  $aTIEDONSIIRTO
*7001 $aHu, Fei.
*852  $i9723233$h61.72$cSECURITY
*979  $a0000023420
*999  $aMikroMarc$b[Book]$x0
^
Tästä teoksesta ei ole arvioita.
Näpäytä kun haluat kirjoittaa ensimmäisen arvion.

The Internet of Things (IoT) has attracted strong interest from both academia and industry. Unfortunately, it has also attracted the attention of hackers. Security and Privacy in Internet of Things (IoTs): Models, Algorithms, and Implementations brings together some of the top IoT security experts from around the world who contribute their knowledge regarding different IoT security aspects. It answers the question "How do we use efficient algorithms, models, and implementations to cover the four important aspects of IoT security, i.e., confidentiality, authentication, integrity, and availability?" The book consists of five parts covering attacks and threats, privacy preservation, trust and authentication, IoT data security, and social awareness. The first part introduces all types of IoT attacks and threats and demonstrates the principle of countermeasures against those attacks. It provides detailed introductions to specific attacks such as malware propagation and Sybil attacks. The second part addresses privacy-preservation issues related to the collection and distribution of data, including medical records. The author uses smart buildings as an example to discuss privacy-protection solutions. The third part describes different types of trust models in the IoT infrastructure, discusses access control to IoT data, and provides a survey of IoT authentication issues. The fourth part emphasizes security issues during IoT data computation. It introduces computational security issues in IoT data processing, security design in time series data aggregation, key generation for data transmission, and concrete security protocols during data access. The fifth and final part considers policy and human behavioral features and covers social-context-based privacy and trust design in IoT platforms as well as policy-based informed consent in the IoT.

Lähetä
Niteen tunnusTilaEräpäiväKuuluuSijaintiHylly
23451Saatavana KirjastoKirjasto 61.72