Enterprise Security

Second International Workshop, ES 2015, Vancouver, BC, Canada, November 30 – December 3, 2015, Revised Selected Papers

  • Victor Chang
  • Muthu Ramachandran
  • Robert J. Walters
  • Gary Wills

Part of the Lecture Notes in Computer Science book series (LNCS, volume 10131)

Also part of the Security and Cryptology book sub series (LNSC, volume 10131)

Table of contents

  1. Front Matter
    Pages I-X
  2. Hamid Jahankhani, Amin Hosseinian-Far
    Pages 1-18
  3. Bob Duncan, Mark Whittington, Martin Gilje Jaatun, Alfredo Ramiro Reyes Zúñiga
    Pages 19-39
  4. Ahmad Ghaffari, Amin Hosseinian-Far, Akbar Sheikh-Akbari
    Pages 73-96
  5. Md. Sadek Ferdous, Farida Chowdhury, Ron Poet
    Pages 120-154
  6. M. Fahim Ferdous Khan, Ken Sakamura, Noboru Koshizuka
    Pages 155-178
  7. Shohreh Hosseinzadeh, Samuel Laurén, Sampsa Rauti, Sami Hyrynsalmi, Mauro Conti, Ville Leppänen
    Pages 179-202
  8. Jose Romero-Mariona, Roger Hallman, Megan Kline, Geancarlo Palavicini, Josiah Bryan, John San Miguel et al.
    Pages 203-222
  9. Fara Yahya, Robert J. Walters, Gary B. Wills
    Pages 223-240
  10. Madini O. Alassafi, Raid K. Hussain, Ghada Ghashgari, R. J. Walters, G. B. Wills
    Pages 241-258
  11. Zeyad S. Aaber, Gary B. Wills, Richard M. Crowder
    Pages 259-275
  12. Back Matter
    Pages 277-277

About these proceedings

Introduction

Enterprise security is an important area since all types of organizations require secure and robust environments, platforms and services to work with people, data and computing applications. The book provides selected papers of the Second International Workshop on Enterprise Security held in Vancouver, Canada, November 30-December 3, 2016 in conjunction with CloudCom 2015.
The 11 papers were selected from 24 submissions and provide a comprehensive research into various areas of enterprise security such as protection of data, privacy and rights, data ownership, trust, unauthorized access and big data ownership, studies and analysis to reduce risks imposed by data leakage, hacking and challenges of Cloud forensics.

Keywords

Computer Science Informatics Conference Proceedings Research Applications

Editors and affiliations

  • Victor Chang
    • 1
  • Muthu Ramachandran
    • 2
  • Robert J. Walters
    • 3
  • Gary Wills
    • 4
  1. 1.Xi’an Jiaotong-Liverpool UniversitySuzhouChina
  2. 2.School of Computing, Creative Technologies, and EngineeringLeeds Beckett UniversityLeedsUnited Kingdom
  3. 3.University of Southampton SouthamptonUnited Kingdom
  4. 4.Department of Electronics and Computer ScienceUniversity of SouthamptonSouthamptonUnited Kingdom

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-54380-2
  • Copyright Information Springer International Publishing AG 2017
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-54379-6
  • Online ISBN 978-3-319-54380-2
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book
Industry Sectors
Pharma
Automotive
Chemical Manufacturing
Electronics
Telecommunications
Consumer Packaged Goods
Energy, Utilities & Environment
Aerospace