𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Security Intelligence for Broadcast : Threat Analytics

✍ Scribed by Sumit Chakraborty


Publisher
Business Analytics Research Lab India
Year
2012
Tongue
English
Leaves
9
Edition
1
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


Broadcast or multicast is one of the most fundamental
concepts in data communication and distributed cryptography. A
central entity wishes to broadcast a secret data stream to a
dynamically changing privileged subset of recipients in such a
way that non-members of the privileged class cannot learn the
secret. This work presents an Adaptively Secure Broadcast
Algorithm (ASBA) based on threats analytics and case based
reasoning. It defines the security intelligence of an adaptively
secure broadcast comprehensively with a novel concept. It
recommends a set of intelligent model checking moves for the
verification of security intelligence of broadcasting mechanism.
The algorithm is analyzed from the perspectives of security
intelligence, communication complexity, computational
intelligence and efficiency of mechanism. The computational
intelligence is associated with the complexity of broadcast
scheduling, verification of security intelligence of broadcasting
system, key management strategies and payment function
computation. The cost of communication depends on number of
agents and subgroups in the broadcasting group and complexity of
data. The algorithm is applicable to the analysis of intelligent
mechanisms in static and dynamic networks, auction or
combinatorial auction for e-market, digital content distribution
through computational advertising, cloud computing, radio and
digital TV broadcast, SCADA and sensor networks.

✦ Table of Contents


The work is organized as follows. Section 1 starts with
introduction, the definition of the problem of adaptively secure
broadcast, research methodology and states contributions. It
reviews existing literature and analyzes the gaps. Section 2
presents adaptively secure broadcast algorithm (ASBA). Section 3
analyzes the algorithm from the perspectives of security
intelligence, computational and communication complexity and
efficiency of mechanism. Section 4 concludes the work.


πŸ“œ SIMILAR VOLUMES


Adaptively Secure Broadcast: Threat Anal
✍ Sumit Chakraborty πŸ“‚ Library πŸ“… 2012 πŸ› Business Analytics Research Lab India 🌐 English

Abstract: This work presents an Adaptively Secure Broadcast Mechanism (ASBM) based on threats analytics. It defines the security intelligence of a broadcast system comprehensively with a novel concept of collective intelligence. The algorithmic mechanism is analyzed from the perspectives of security

Security Intelligence for Broadcast: Al
✍ Sumit Chakraborty πŸ“‚ Library πŸ“… 2012 πŸ› Business Analytics Research Lab India 🌐 English

Abstract: Broadcast or multicast is one of the most fundamental concepts in data communication distributed cryptography. A central entity wishes to broadcast a secret data stream to a dynamically changing privileged subset of recipients in such a way that non-members of the privileged class cannot l

Big Data Analytics and Intelligent Syste
✍ Yassine Maleh (editor), Mamoun Alazab (editor), Loai Tawalbeh (editor), Imed Rom πŸ“‚ Library πŸ“… 2023 πŸ› River Publishers 🌐 English

<p><span>In recent years, a considerable amount of effort has been devoted to cyber-threat protection of computer systems which is one of the most critical cybersecurity tasks for single users and businesses since even a single attack can result in compromised data and sufficient losses. Massive los

Artificial Intelligence and Advanced Ana
✍ Chandrasekar Vuppalapati πŸ“‚ Library πŸ“… 2023 πŸ› CRC Press 🌐 English

<p><span>Climate change, increasing population, food-versus-fuel economics, pandemics, etc. pose a threat to food security to unprecedented levels. It has fallen upon the practitioners of agriculture and technologists of the world to innovate and become more productive to address the multi-pronged f

Intelligent Multimedia Analysis for Secu
✍ Simone Calderara, Rita Cucchiara (auth.), Husrev Taha Sencar, Sergio Velastin, N πŸ“‚ Library πŸ“… 2010 πŸ› Springer-Verlag Berlin Heidelberg 🌐 English

<p>This is one of the very few books focused on analysis of multimedia data and newly emerging multimedia applications with an emphasis on security. The main objective of this project was to assemble as much research coverage as possible related to the field by defining the latest innovative technol

Structured Analytic Techniques for Intel
✍ Randolph H. Pherson, Richards J. Heuer πŸ“‚ Library πŸ“… 2020 πŸ› CQ Press 🌐 English

The <strong>Third Edition </strong>of <strong>Structured Analytic Techniques for Intelligence Analysis</strong> by Randolph H. Pherson and Richards J. Heuer Jr showcases sixty-six structured analytic techniques―nine new to this edition―that represent the most current best practices in intelligence,