Linked e-resources

Details

Intro; Contents; Contributors; Big Data and Internet of Things Security and Forensics: Challenges and Opportunities; 1 Introduction; 2 Book Outline; References; Privacy of Big Data: A Review; 1 Introduction; 2 Big Data; 2.1 Big Data Framework; 3 Big Data Architecture; 4 Literature Review; 4.1 Input Privacy; 4.1.1 K Anonymity; 4.1.2 diversity; 4.1.3 t-Closeness; 4.1.4 Differential Privacy; 4.2 Output Privacy; 4.2.1 Association Rule Hiding; 4.2.2 Query Auditing; 4.2.3 Classification Accuracy; 5 Metrics to Measure Data Quality; 6 Summary of Existing Big Data Privacy Preservation Models

7 ConclusionReferences; A Bibliometric Analysis of Authentication and Access Control in IoT Devices; 1 Introduction; 2 Methodology; 3 Findings; 3.1 Country of Origin; 3.2 Research Area; 3.3 Research Institution; 3.4 Author; 3.5 Journal; 3.6 Highly Cited Articles; 3.7 Keywords; 4 Research Trends; 4.1 Productivity; 4.2 Keywords; 5 Conclusion and Future Works; References; Towards Indeterminacy-Tolerant Access Control in IoT; 1 Introduction; 2 Background; 2.1 An Introduction to Access Control; 2.2 Access Control Models; 3 Indeterminacy in Access Control; 3.1 Uncertainty in Access Control

3.2 Ambiguity in Access Control3.3 Proposed Framework; 4 Conclusion; References; Private Cloud Storage Forensics: Seafile as a Case Study; 1 Introduction; 2 Related Work; 3 A Conceptual Private Cloud Forensics Framework; 4 Background; 5 Experimental Setup; 6 Client Forensics; 6.1 Evidence Analysis and Reconstruction; 6.2 Sync and File Management Metadata; 6.3 Authentication and Encryption Metadata; 6.4 Cloud Transaction Logs; 6.5 Data Storage; 6.6 Network Analysis; 6.7 Memory Analysis; 6.8 Server Forensics (Divide and Conquer); 6.8.1 Evidence Source Identification

6.8.2 Collection and Preservation of Evidence6.8.3 Evidence Analysis and Reconstruction; 7 Discussion; 8 Conclusion and Future Work; References; Distributed Filesystem Forensics: Ceph as a Case Study; 1 Introduction; 2 Related Work; 3 Cloud Forensics Framework; 3.1 Stage 1: The Location, Collection and Examination of DIR; 3.2 Stage 2: The Location, Collection and Examination of Metadata Cluster; 3.3 Stage 3: The Location, Collection and Examination of OSD; 4 Environment and Experimental Setup; 4.1 Ceph Overview; 4.2 Ceph Filesystem; 4.3 Ceph Storage Cluster; 4.4 Environment Configuration

5 Findings and Analysis5.1 Directory Services; 5.2 Metadata Cluster; 5.3 Object Storage Device; 6 Conclusion and Recommendations for Further Research; References; Forensic Investigation of Cross Platform Massively Multiplayer Online Games: Minecraft as a Case Study; 1 Introduction; 1.1 Problem Statement; 2 Literature Review; 3 Research Methodology; 3.1 Forensic Framework; 3.1.1 Phase 1: Evidence Source Identification and Preservation; 3.1.2 Phase 2: Collection; 3.1.3 Phase 3: Analysis; 3.1.4 Phase 4: Reporting and Presentation; 3.2 Experimental Setup; 4 Server Analysis; 4.1 Analysis; 4.2 Linux

Browse Subjects

Show more subjects...

Statistics

from
to
Export