0 évaluation0% ont trouvé ce document utile (0 vote)
17 vues0 page
This document lists 151 potential research topics related to data and information security from 2013. Some of the key areas included access control and authorization, anonymity and privacy, application security, attacks and prevention, authentication, biometrics, cloud computing security, cryptography, cybercrime, data protection, distributed denial of service attacks, intrusion detection, mobile security, network security, privacy-preserving systems, secure electronic commerce and web security. The broad range of topics shows the wide-ranging nature of security research.
This document lists 151 potential research topics related to data and information security from 2013. Some of the key areas included access control and authorization, anonymity and privacy, application security, attacks and prevention, authentication, biometrics, cloud computing security, cryptography, cybercrime, data protection, distributed denial of service attacks, intrusion detection, mobile security, network security, privacy-preserving systems, secure electronic commerce and web security. The broad range of topics shows the wide-ranging nature of security research.
Droits d'auteur :
Attribution Non-Commercial (BY-NC)
Formats disponibles
Téléchargez comme PDF, TXT ou lisez en ligne sur Scribd
This document lists 151 potential research topics related to data and information security from 2013. Some of the key areas included access control and authorization, anonymity and privacy, application security, attacks and prevention, authentication, biometrics, cloud computing security, cryptography, cybercrime, data protection, distributed denial of service attacks, intrusion detection, mobile security, network security, privacy-preserving systems, secure electronic commerce and web security. The broad range of topics shows the wide-ranging nature of security research.
Droits d'auteur :
Attribution Non-Commercial (BY-NC)
Formats disponibles
Téléchargez comme PDF, TXT ou lisez en ligne sur Scribd
DATA AND INFORMATION SECURITY RESEARCH TOPICS (2013)
1. Access control and authorization 77. Privacy on WEB and DB
2. Access control policies 78. Privacy preserving system 3. Anonymity and Privacy 79. Provable Security 4. Application Security 80. Public key infrastructure 5. Attack response, countermeasures, and intrusion tolerance 81. Quantum Cryptography 82. Ransom Attacks 6. Attacks against IDS and evasion 83. Reactive firewalls 7. Attacks and Prevention of Online Fraud 84. Resource usage control 8. Authentication and Authorization 85. RFID security 9. Authentication, biometrics, smartcards 86. Risk analysis and risk management 10. Authorization and access control 87. Risk Evaluation of critical assets 11. Biometric Security(Tu basma ritmi, parmak izi) 88. Secret Key and Public Key Cryptosystems 12. Block Cipher Modes of Operation 89. Secure context aware computing 13. Cloud Computing Security 90. Secure e-government 14. Common Criteria 91. secure electronic commerce 15. Computer forensics analysis 92. Secure routing 16. Cooperation and fairness 93. Secure topology control 17. Criminal Network Analysis 94. Secure ubiquitous computing 18. Cryptographic Protocols and Functions 95. security administration 19. Cybercrime and Cybersecurity, 96. Security and Privacy in Pervasive/Ubiquitous Computing 20. Data and application security 97. Security as quality of service 21. Data Governance and Data Leakage Prevention 98. Security evaluation 22. Data protection 99. Security for embedded systems 23. Deception systems and honeypots 100. Security for Mobile Code 24. Distributeed Denial of service attacks 101. Security for mobile computing 25. Botnets and identification 102. Security in Information Flow 26. Design and Analysis of Cryptographic Algorithms 103. Security in sensor networks 27. Digital Rights Management 104. security in social networks 28. Digital signatures 105. Security management 29. Distributed firewalls 106. Security Metrics 30. Distributed intrusion detection 107. Security Modeling and Architectures 31. Distributed System Security 108. Security of eCommerce, eBusiness and eGovernment 32. e-business/e-commerce security 109. Security of Grid Computing 33. Economics of Security and Privacy 110. Security Protocols and Their Analysis 34. Efficient representations and implementations 35. Electronic Evidence Analysis 36. Electronic voting Security 111. Software Security 37. Enterprise security models and policies 112. Social Media security 113. Social Network Attacks 114. System security 38. Firewalls 39. Foundations of Computer Security 115. Transaction Security 40. Hacking Philosophy 116. Trust models and trust management policies 41. Hash Functions and MACs 117. Trusted Computing 42. High-performance intrusion detection 118. Viruses and other malicious codes 43. Identity and Trust Management 119. Vulnerability analysis and risk assessment 44. IDS cooperation and event correlation 120. Web Security 45. Implementation of Cryptosystems 121. 46. Information Hiding and Watermarking 122. 47. Information Security Standards and certification 123. 48. Information Systems Auditing 124. 49. Information warfare and critical infrastructure protection 125. 50. Infrastructure Security 126. 51. Insider threat detection and mitigation 127. 52. Intellectual Property Protection 128. 53. Internet and web security 129. 54. Intrusion detection and prevention techniques 130. 55. Intrusion detection assessment and benchmarking 131. 56. Intrusion detection in mobile networks) 132. 57. Intrusion prediction 133. 58. IP Tarace back 134. 59. ISMS and ISG(Inf. Security Governance) 135. 60. Key Management and Key Recovery 136. 61. Language-based security 137. 62. Legal and social issues 138. 63. Location privacy 139. 64. Malicious code detection and containment 140. 65. Mobile code and mobile agent security 141. 66. Mobile security 142. 67. Mobile System Security 143. 68. Mobile, Ad Hoc and Sensor Network Security 144. 69. Network and Wireless Network Security 145. 70. Network Security 146. 71. Operating System Security 147. 72. Peer-to-Peer Network Security 148. 73. Phishing 149. 74. PKI and PMI 150. 75. Prevention of traffic analysis 151. 76. Privacy and anonymity