000 | 04264nam a22004815i 4500 | ||
---|---|---|---|
001 | 978-3-642-38586-5 | ||
003 | DE-He213 | ||
005 | 20200420220227.0 | ||
007 | cr nn 008mamaa | ||
008 | 130903s2014 gw | s |||| 0|eng d | ||
020 |
_a9783642385865 _9978-3-642-38586-5 |
||
024 | 7 |
_a10.1007/978-3-642-38586-5 _2doi |
|
050 | 4 | _aTK1-9971 | |
072 | 7 |
_aTJK _2bicssc |
|
072 | 7 |
_aTEC041000 _2bisacsh |
|
082 | 0 | 4 |
_a621.382 _223 |
245 | 1 | 0 |
_aSecurity, Privacy and Trust in Cloud Systems _h[electronic resource] / _cedited by Surya Nepal, Mukaddim Pathan. |
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg : _bImprint: Springer, _c2014. |
|
300 |
_aXX, 459 p. 146 illus., 95 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
505 | 0 | _aPart I Cloud Computing Fundamentals -- Introduction to cloud computing -- Secure information sharing and data protection in the cloud -- Intra and inter-cloud security, privacy and trust -- Cloud-based eGovernance -- Part II Cloud Security -- Cloud security architecture and protocol -- Secure cloud data management service -- Security and virtualization -- Autonomic security in cloud systems -- Part III Cloud Privacy -- Cryptography and crypto-protocols for cloud systems -- Access control mechanisms -- Risk management in the cloud -- Privacy protection policies in cloud platforms and operations -- Part IV Cloud Trust -- Trust models for cloud services -- QoS-based trust model and QoS monitoring mechanism -- Cloud compliance -- Non-repudiation and reputation in the cloud -- Part V Case Studies -- Secure cloud platforms and applications -- Enterprise cloud security case study -- Open research issues in cloud security and future roadmap -- Cloud and eGovernment tutorial: Challenges, solutions and experiences. | |
520 | _aThe book compiles technologies for enhancing and provisioning security, privacy and trust in cloud systems based on Quality of Servise requirements. It is a timely contribution to a field that is gaining considerable research interest, momentum, and provides a comprehensive coverage of technologies related to cloud security, privacy and trust. In particular, the book includes - Cloud security fundamentals and related technologies to-date, with a comprehensive coverage of evolution, current landscape, and future roadmap. - A smooth organization with introductory, advanced and specialist content, i.e. from basics of security, privacy and trust in cloud systems, to advanced cartographic techniques, case studies covering both social and technological aspects, and advanced platforms. - Case studies written by professionals and/or industrial researchers. - Inclusion of a section on Cloud security and eGovernance tutorial that can be used for knowledge transfer and teaching purpose. - Identification of open research issues to help practitioners and researchers. The book is a timely topic for readers, including practicing engineers and academics, in the domains related to the engineering, science, and art of building networks and networked applications. Specifically, upon reading this book, audiences will perceive the following benefits: 1. Learn the state-of-the-art in research and development on cloud security, privacy and trust. 2. Obtain a future roadmap by learning open research issues. 3. Gather the background knowledge to tackle key problems, whose solutions will enhance the evolution of next-generation secure cloud systems. | ||
650 | 0 | _aEngineering. | |
650 | 0 | _aComputer security. | |
650 | 0 | _aData encryption (Computer science). | |
650 | 0 | _aElectrical engineering. | |
650 | 1 | 4 | _aEngineering. |
650 | 2 | 4 | _aCommunications Engineering, Networks. |
650 | 2 | 4 | _aSystems and Data Security. |
650 | 2 | 4 | _aData Encryption. |
700 | 1 |
_aNepal, Surya. _eeditor. |
|
700 | 1 |
_aPathan, Mukaddim. _eeditor. |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer eBooks | |
776 | 0 | 8 |
_iPrinted edition: _z9783642385858 |
856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/978-3-642-38586-5 |
912 | _aZDB-2-ENG | ||
942 | _cEBK | ||
999 |
_c52270 _d52270 |