Accountability and Privacy in Network Security - Yuxiang Ma, Yulei Wu, Jingguo Ge

Accountability and Privacy in Network Security (eBook)

eBook Download: PDF
2020 | 1st ed. 2020
XII, 140 Seiten
Springer Singapore (Verlag)
978-981-15-6575-5 (ISBN)
Systemvoraussetzungen
96,29 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen

This book discusses accountability and privacy in network security from a technical perspective, providing a comprehensive overview of the latest research, as well as the current challenges and open issues. Further, it proposes a set of new and innovative solutions to balance privacy and accountability in networks in terms of their content, flow and service, using practical deep learning techniques for encrypted traffic analysis and focusing on the application of new technologies and concepts. These solutions take into account various key components (e.g. the in-network cache) in network architectures and adopt the emerging blockchain technique to ensure the security and scalability of the proposed architectures. In addition, the book examines in detail related studies on accountability and privacy, and validates the architectures using real-world datasets.

 

Presenting secure and scalable solutions that can detect malicious behaviors in the network in a timely manner without compromising user privacy, the book offers a valuable resource for undergraduate and graduate students, researchers, and engineers working in the fields of network architecture and cybersecurity.



Yuxiang Ma is an Associate Professor with the School of Computer and Information Engineering, Henan University. He received his B.S. degree in Network Engineering from Henan University in 2013 and his Ph.D. degree in Computer Architecture from the Computer Network Information Center, Chinese Academy of Sciences, in 2019. His research interests include computer network architectures and protocols, network security, and privacy enhancement technologies. He has published over 10 research papers.

Yulei Wu is a Senior Lecturer with the Department of Computer Science, College of Engineering, Mathematics and Physical Sciences, University of Exeter, UK. He received his B.Sc. degree (1st Class Hons.) in Computer Science and his Ph.D. degree in Computing and Mathematics from the University of Bradford, UK, in 2006 and 2010, respectively. His expertise is on networking, and his main research interests include computer networks, networked systems, software-defined networks and systems, network management, and network security and privacy. Dr. Wu contributes to major conferences on networking and networked systems as various roles, including Steering Committee Chair, General Chair, and Program Chair. His research has been supported by Engineering and Physical Sciences Research Council of UK, National Natural Science Foundation of China, and University's Innovation Platform and industry. He is an Editor of IEEE Transactions on Network and Service Management, Computer Networks (Elsevier), and IEEE Access. He is a Senior Member of the IEEE and a Fellow of the HEA (Higher Education Academy). 

Jingguo Ge is currently a Professor at the Institute of Information Engineering, Chinese Academy of Sciences, and at the School of Cyber Security, University of the Chinese Academy of Sciences. He received his Ph.D. degree in Computer System Architecture from the Institute of Computing Technology, Chinese Academy of Sciences, in 2003. His research interests include computer network architectures, software-defined networks, network virtualization, cybersecurity, and mobile communication networks.


This book discusses accountability and privacy in network security from a technical perspective, providing a comprehensive overview of the latest research, as well as the current challenges and open issues. Further, it proposes a set of new and innovative solutions to balance privacy and accountability in networks in terms of their content, flow and service, using practical deep learning techniques for encrypted traffic analysis and focusing on the application of new technologies and concepts. These solutions take into account various key components (e.g. the in-network cache) in network architectures and adopt the emerging blockchain technique to ensure the security and scalability of the proposed architectures. In addition, the book examines in detail related studies on accountability and privacy, and validates the architectures using real-world datasets.  Presenting secure and scalable solutions that can detect malicious behaviors in the network in a timely manner without compromising user privacy, the book offers a valuable resource for undergraduate and graduate students, researchers, and engineers working in the fields of network architecture and cybersecurity.
Erscheint lt. Verlag 15.9.2020
Zusatzinfo XII, 140 p. 62 illus., 59 illus. in color.
Sprache englisch
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Mathematik / Informatik Informatik Theorie / Studium
Informatik Weitere Themen Hardware
Schlagworte Accountability • Blockchain • Content-Based Architecture • Flow-Based Architecture • Information-Centric Networking • machine learning • Named Data Networking • privacy • Service-based architecture
ISBN-10 981-15-6575-9 / 9811565759
ISBN-13 978-981-15-6575-5 / 9789811565755
Haben Sie eine Frage zum Produkt?
PDFPDF (Wasserzeichen)
Größe: 4,2 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Das Praxishandbuch zu Krisenmanagement und Krisenkommunikation

von Holger Kaschner

eBook Download (2024)
Springer Fachmedien Wiesbaden (Verlag)
34,99
Methodische Kombination von IT-Strategie und IT-Reifegradmodell

von Markus Mangiapane; Roman P. Büchler

eBook Download (2024)
Springer Vieweg (Verlag)
42,99