The Cloud Security Ecosystem - Technical, Legal, Business and Management Issues

The Cloud Security Ecosystem - Technical, Legal, Business and Management Issues

von: Ryan Ko, Raymond Choo

Elsevier Reference Monographs, 2015

ISBN: 9780128017807 , 570 Seiten

Format: PDF, ePUB

Kopierschutz: DRM

Windows PC,Mac OSX für alle DRM-fähigen eReader Apple iPad, Android Tablet PC's Apple iPod touch, iPhone und Android Smartphones

Preis: 85,95 EUR

Mehr zum Inhalt

The Cloud Security Ecosystem - Technical, Legal, Business and Management Issues


 

About the Authors


Nurul Hidayah Ab Rahman is a Ph.D. Scholar at the University of South Australia, Australia. She received the B.Sc. (Hons.) degree from Universiti Teknologi MARA, Malaysia, and M.Sc. degree from Universiti Teknologi, Malaysia, in 2006 and 2010, respectively. Since 2011, she has been with the Information Security Department, University of Tun Hussein Onn, Malaysia, where she is currently an Academician.

Her main areas of research interest are information security management and cloud computing security.

Abdussalam Ali is a Ph.D. Scholar at the University of Technology, Sydney, Australia. He has a Bachelor degree in computer engineering and a Master’s degree in computer science.

Vivek Agrawal is a Ph.D. Scholar at Gjøvik University College, Norway. He received the M.S. degree in information and communication systems security from Royal Institute of Technology, Sweden, in 2013. He is currently working toward the Ph.D. degree in migration of risk analysis tool to cloud at University College Gjøvik, Norway. His general interests are in the field of information security. His specific interests include software engineering, network security, secure cloud computing, risk analysis methods, and tools.

Olaf Bergmann is a Lecturer in communication networks and Internet technology at Universität Bremen, Germany. He received his Doctorate in engineering (Dr.Ing.) in 2007 from Universität Bremen and holds a Master in commercial law since 2010. He has been involved in several national and international research projects in the areas of wireless and interpersonal multimedia communications. Olaf also has continuously participated in IETF standardization since 2000 and has coauthored several books on Web technologies. His current research focus is on architectures and communication protocols for constrained environments. Recently, he has initiated the open-source projects libcoap and tinydtls to leverage development of applications for the Internet of Things.

Carsten Bormann, Honorarprofessor for Internet technology at the Universität Bremen, Germany, is a board member of its Center for Computing and Communications Technology (TZI). His research interests are in protocol design and system architectures for networking. In the IETF, he led a number of efforts on making IP networking work on unusual devices, including ROHC and 6LoWPAN. Most recently, he initiated the IETF work on Constrained RESTful Environments and the CoAP (Constrained Application) Protocol and is cochairing the IETF CoRE WG. He has authored and coauthored 29 Internet RFCs, which are in turn cited 211 times in other RFCs.

Kim-Kwang Raymond Choo is a Fulbright Scholar and Senior Researcher at the University of South Australia, Australia. He is the coinventor of three provisional patents on digital forensics and mobile app security. His publications include a book published in Springer’s Advances in Information Security book series, and a book published by Syngress/Elsevier (Forewords written by Australia’s Chief Defence Scientist and Chair of the Electronic Evidence Specialist Advisory Group, Senior Managers of Australian and New Zealand Forensic Laboratories). He is currently the Editor of IEEE Cloud Computing Magazine’s “Cloud and the Law” column, coeditor for Syngress/Elsevier’s “Advanced Topics in Security, Privacy and Forensics” Book Series, and Research Director of Cloud Security Alliance Australia Chapter. He is also guest-editing an IEEE Cloud Computing Magazine Special Issue, IEEE Transactions on Cloud Computing Special Issue, Future Generation Computer Systems Special Issue, Journal of Computer and System Sciences Special Issue, Pervasive and Mobile Computing Special Issue, Digital Investigation Special Issue and ACM Transactions on Internet Technology Special Issue. In 2009, he was named one of 10 Emerging Leaders in the Innovation category of The Weekend Australian Magazine/Microsoft's Next 100 series. He is the recipient of the Highly Commended Award in the 2014 “Best Chapter in a Book” Category by Australia New Zealand Policing Advisory Agency (ANZPAA) National Institute of Forensic Science (NIFS), 2014 Academic Impact and Uptake Award (University of South Australia), 2010 Australian Capital Territory Pearcey Award, 2010 Consensus IT Professional Award, 2008 Australia Day Achievement Medallion, and the British Computer Society's Wilkes Award for the best (sole-authored) paper published in the 2007 volume of The Computer Journal.

Ali Dehghantanha is a Cyber Security Researcher and Lecturer at University of Salford—Manchester, UK. He has served for several years in variety of industrial and academic positions with leading players in Cyber-Security and E-Commerce. He has long history of working in different areas of computer security as security researcher, malware analyzer, penetration tester, security consultant, professional trainer, and university lecturer. As a security researcher, Ali is actively researching on latest trends in “Real-Time Malware Detection and Analysis in Mobile and Pervasive Systems,” “0-Day Malware and Exploit Detection Techniques,” and “Big-Data Forensics”. He leads several academic research teams working on above-mentioned projects in University of Salford (UoS)—Greater Manchester.

Baden Delamore is a Masters student at the University of Waikato undertaking research with the Cyber Security Researchers of Waikato (CROW). Recipient of the Waikato University Masters Research Scholarship, he holds a Bachelor of information technology, two Diploma's in information and communication technology and a Postgraduate Diploma in computer science. Prior to his research, Baden developed applications for numerous software projects (e.g. Waikato Institute of Technology Sports Science Department, Internet Marketing solutions) currently in production today. His main research interests are software engineering and cyber security, in particular, the application of offensive and defensive security techniques. His Master’s research thesis proposes an efficient and effect user-centric security assessment methodology of Web servers. He is a member of the IEEE.

Quang Do is a Ph.D. Scholar at the University of South Australia, Australia, and holds a Bachelor of computer science (First Class Honors). He is the recipient of the prestigious University of South Australia Vice Chancellor and President’s Scholarship and is an active Android security researcher.

Stefanie Gerdes is a Research Scientist in computer science at the AG Rechnernetze at Universität Bremen in Germany. Her research focuses on information security, in particular, on the specific challenges of securing smart objects in the Internet of Things. Currently, she participates in standardization efforts in the Internet Engineering Task Force (IETF) concerning authentication and authorization in constrained environments (ACE).

William Bradley Glisson is currently an Associate Professor at the University of South Alabama, USA. He has a Ph.D. in computing science from the University of Glasgow, Scotland, 2008; Master of Science in information management from the University of Strathclyde, Scotland, 2001; Bachelor of Science in information systems & operations management from the University of North Carolina at Greensboro, 1999; and a Bachelor of Science in management from the University of North Carolina at Greensboro, 1993. Dr. Glisson has 10 years of industrial experience which includes working for U.S. and UK Global Fortune 500 financial institutions. Dr. Glisson has been the primary investigator on residual data research projects funded predominantly by industry. His area of research focuses on digital forensics, information assurance, software engineering, and applied computing science with a specific interest in the security and business implications of residual data. Previous to this appointment, he was the Director of the Computer Forensics M.Sc. program at the University of Glasgow for 5 years. He builds on previous administrative and teaching experiences to teach and improve digital forensic courses while researching relevant real-world digital forensic issues at the University of South Alabama.

George Grispos is a Doctoral Researcher at the University of Glasgow, Scotland. He is currently completing a Ph.D. in computing science which focuses on the business implications of information security incidents along with the subsequent management and handling of such incidents. Previously, George completed a Master of Science (M.Sc.) in computer forensics and e-discovery from the University of Glasgow, and a Bachelor of Science (B.Sc. Hons.) in computer networks from Middlesex University in London. In addition to security incident response, his research interests include: digital forensics, information security management, as well as examining the managerial and technical issues surrounding secure cloud computing services within organizations.

Sheikh Mahbub Habib is a Postdoctoral researcher at the Telecooperation Lab. and Coordinator of CASED Secure Services research area in Germany. Additionally, he is leading the Smart Security & Trust area as a part of the Telecooperation Lab. since September 2013. Sheikh obtained his doctoral degree from Technische Universität Darmstadt in 2013 for his work on computational trust mechanisms with focus on distributed service environments. His current...