Security, privacy and trust in cloud systems /
Saved in:
Imprint: | Heidelberg : Springer, [2013?] ©2014 |
---|---|
Description: | 1 online resource. |
Language: | English |
Subject: | |
Format: | E-Resource Book |
URL for this record: | http://pi.lib.uchicago.edu/1001/cat/bib/11080375 |
MARC
LEADER | 00000cam a2200000Ki 4500 | ||
---|---|---|---|
001 | 11080375 | ||
005 | 20170630045545.6 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 130916t20132014gw o 001 0 eng d | ||
003 | ICU | ||
040 | |a GW5XE |b eng |e rda |e pn |c GW5XE |d N$T |d YDXCP |d COO |d OCLCO |d BEDGE |d OCLCQ |d OCLCO |d EBLCP |d E7B |d GGVRL |d A7U |d DEBSZ |d DIBIB |d NUI |d OCLCF |d Z5A | ||
019 | |a 861528792 |a 876298097 |a 912411681 | ||
020 | |a 9783642385865 |q (electronic bk.) | ||
020 | |a 3642385869 |q (electronic bk.) | ||
020 | |z 9783642385858 | ||
020 | |a 3642385850 | ||
020 | |a 9783642385858 | ||
024 | 7 | |a 10.1007/978-3-642-38586-5 |2 doi | |
035 | |a (OCoLC)858275698 |z (OCoLC)861528792 |z (OCoLC)876298097 |z (OCoLC)912411681 | ||
050 | 4 | |a QA76.585 | |
072 | 7 | |a COM |x 013000 |2 bisacsh | |
072 | 7 | |a COM |x 014000 |2 bisacsh | |
072 | 7 | |a COM |x 018000 |2 bisacsh | |
072 | 7 | |a COM |x 067000 |2 bisacsh | |
072 | 7 | |a COM |x 032000 |2 bisacsh | |
072 | 7 | |a COM |x 037000 |2 bisacsh | |
072 | 7 | |a COM |x 052000 |2 bisacsh | |
072 | 7 | |a TJK |2 bicssc | |
049 | |a MAIN | ||
245 | 0 | 0 | |a Security, privacy and trust in cloud systems / |c Surya Nepal, Mukaddim Pathan, editors. |
264 | 1 | |a Heidelberg : |b Springer, |c [2013?] | |
264 | 4 | |c ©2014 | |
300 | |a 1 online resource. | ||
336 | |a text |b txt |2 rdacontent |0 http://id.loc.gov/vocabulary/contentTypes/txt | ||
337 | |a computer |b c |2 rdamedia |0 http://id.loc.gov/vocabulary/mediaTypes/c | ||
338 | |a online resource |b cr |2 rdacarrier |0 http://id.loc.gov/vocabulary/carriers/cr | ||
347 | |a text file |b PDF |2 rda | ||
505 | 0 | |a Part I. Cloud Computing Fundamentals -- Introduction to cloud computing -- Secure information sharing and data protection in the cloud -- Intra and inter-cloud security, privacy and trust -- Cloud-based eGovernance -- Part II. Cloud Security -- Cloud security architecture and protocol -- Secure cloud data management service -- Security and virtualization -- Autonomic security in cloud systems -- Part III. Cloud Privacy -- Cryptography and crypto-protocols for cloud systems -- Access control mechanisms -- Risk management in the cloud -- Privacy protection policies in cloud platforms and operations -- Part IV. Cloud Trust -- Trust models for cloud services -- QoS-based trust model and QoS monitoring mechanism -- Cloud compliance -- Non-repudiation and reputation in the cloud -- Part V. Case Studies -- Secure cloud platforms and applications -- Enterprise cloud security case study -- Open research issues in cloud security and future roadmap -- Cloud and eGovernment tutorial: Challenges, solutions and experiences. | |
500 | |a Includes index. | ||
520 | |a The book compiles technologies for enhancing and provisioning security, privacy and trust in cloud systems based on Quality of Servise requirements. It is a timely contribution to a field that is gaining considerable research interest, momentum, and provides a comprehensive coverage of technologies related to cloud security, privacy and trust. In particular, the book includes - Cloud security fundamentals and related technologies to-date, with a comprehensive coverage of evolution, current landscape, and future roadmap. - A smooth organization with introductory, advanced and specialist content, i.e. from basics of security, privacy and trust in cloud systems, to advanced cartographic techniques, case studies covering both social and technological aspects, and advanced platforms. - Case studies written by professionals and/or industrial researchers. - Inclusion of a section on Cloud security and eGovernance tutorial that can be used for knowledge transfer and teaching purpose. - Identification of open research issues to help practitioners and researchers. The book is a timely topic for readers, including practicing engineers and academics, in the domains related to the engineering, science, and art of building networks and networked applications. Specifically, upon reading this book, audiences will perceive the following benefits: 1. Learn the state-of-the-art in research and development on cloud security, privacy and trust. 2. Obtain a future roadmap by learning open research issues. 3. Gather the background knowledge to tackle key problems, whose solutions will enhance the evolution of next-generation secure cloud systems. | ||
588 | 0 | |a Print version record. | |
504 | |a Includes bibliographical references and index. | ||
650 | 0 | |a Cloud computing |x Security measures. | |
650 | 0 | |a Computer networks |x Security measures. |0 http://id.loc.gov/authorities/subjects/sh94001277 | |
650 | 0 | |a Computer security. |0 http://id.loc.gov/authorities/subjects/sh90001862 | |
650 | 7 | |a COMPUTERS |x Computer Literacy. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Computer Science. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Data Processing. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Hardware |x General. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Information Technology. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Machine Theory. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Reference. |2 bisacsh | |
650 | 7 | |a Ingénierie. |2 eclas | |
650 | 2 | 4 | |a Communications Engineering, Networks. |
650 | 2 | 4 | |a Systems and Data Security. |
650 | 2 | 4 | |a Data Encryption. |
650 | 7 | |a Data encryption (Computer science) |2 fast |0 (OCoLC)fst00887935 | |
650 | 7 | |a Data protection. |2 fast |0 (OCoLC)fst00887958 | |
650 | 7 | |a Engineering. |2 fast |0 (OCoLC)fst00910312 | |
650 | 7 | |a Telecommunication. |2 fast |0 (OCoLC)fst01145830 | |
655 | 4 | |a Electronic books. | |
655 | 0 | |a Electronic books. | |
655 | 7 | |a Ebook. |2 local | |
700 | 1 | |a Nepal, Surya, |d 1970- |e editor. |0 http://id.loc.gov/authorities/names/n2004153234 |1 http://viaf.org/viaf/36317761 | |
700 | 1 | |a Pathan, Mukaddim, |e editor. |0 http://id.loc.gov/authorities/names/no2008184527 |1 http://viaf.org/viaf/56442176 | |
776 | 0 | 8 | |i Print version: |t Security, privacy and trust in cloud systems |z 3642385850 |w (OCoLC)841520790 |
856 | 4 | 0 | |u http://link.springer.com/10.1007/978-3-642-38586-5 |y SpringerLink |
903 | |a HeVa | ||
929 | |a eresource | ||
999 | f | f | |i c4f40c18-4017-5570-ad35-92a513d06423 |s 1ed70f8c-1b0b-5ac3-8a1d-f90b2b72a9c0 |
928 | |t Library of Congress classification |a QA76.585 |l Online |c UC-FullText |u http://link.springer.com/10.1007/978-3-642-38586-5 |z SpringerLink |g ebooks |i 9890601 |