DSpace logo

Please use this identifier to cite or link to this item: http://dspace.bits-pilani.ac.in:8080/jspui/handle/123456789/16307
Full metadata record
DC FieldValueLanguage
dc.contributor.authorGupta, Shashank-
dc.date.accessioned2024-11-05T12:26:12Z-
dc.date.available2024-11-05T12:26:12Z-
dc.date.issued2018-
dc.identifier.urihttps://www.igi-global.com/chapter/reviewing-the-security-features-in-contemporary-security-policies-and-models-for-multiple-platforms/188268-
dc.identifier.urihttp://dspace.bits-pilani.ac.in:8080/jspui/handle/123456789/16307-
dc.description.abstractNumerous vulnerabilities have a tendency to taint modern real-world web applications, allowing attackers in retrieving sensitive information and exploiting genuine web applications as a platform for malware activities. Moreover, computing techniques are evolved from the large desktop computer systems to the devices like smartphones, smart watches and goggles. This needs to be ensure that these devices improve their usability and will not be utilized for attacking the personal credentilas (such as credit card numbers, transaction passwords, etc.) of the users. Therefore, there is a need of security architecture over the user's credentials so that no unauthorized user can access it. This chapter summarizes various security models and techniques that are being discovered, studied and utilized extensively in order to ensure computer security. It also discusses numerous security principles and presents the models that ensure these security principles. Security models (such as access control models, information flow models, protection ring, etc.) form the basis of various higher level and complex models. Therefore, learning such security models is very much essential for ensuring the security of the computer and cyber world.en_US
dc.language.isoenen_US
dc.publisherIGI Globalen_US
dc.subjectComputer Scienceen_US
dc.subjectSecurity Policiesen_US
dc.subjectCyber worlden_US
dc.titleReviewing the Security Features in Contemporary Security Policies and Models for Multiple Platformen_US
dc.typeBook chapteren_US
Appears in Collections:Department of Computer Science and Information Systems

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.