The Resource Cloud computing security : foundations and challenges, edited by John R. Vacca
Cloud computing security : foundations and challenges, edited by John R. Vacca
Resource Information
The item Cloud computing security : foundations and challenges, edited by John R. Vacca represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in Missouri University of Science & Technology Library.This item is available to borrow from 1 library branch.
Resource Information
The item Cloud computing security : foundations and challenges, edited by John R. Vacca represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in Missouri University of Science & Technology Library.
This item is available to borrow from 1 library branch.
- Summary
- This handbook offers a comprehensive overview of cloud computing security technology and implementation, while exploring practical solutions to a wide range of cloud computing security issues. With more organizations using cloud computing and cloud providers for data operations, proper security in these and other potentially vulnerable areas have become a priority for organizations of all sizes across the globe. Research efforts from both academia and industry in all security aspects related to cloud computing are gathered within one reference guide. -- Provided by publisher
- Language
- eng
- Extent
- 1 online resource (xxv, 492 pages)
- Contents
-
- Cloud computing essentials / Anna Squicciarini, Daniela Oliveira, and Dan Lin
- Overview of cloud computing / William Stallings
- Cloud security baselines / Daniela Oliveira, Anna Squicciarini, and Dan Lin
- Cloud security, privacy, and trust baselines / Nikolaos Pitropakis, Sokratis K. Katsikas, and Costas Lambrinoudakis
- Infrastructure as a service (IaaS) / Mario Santana
- Risk and trust assessment: schemes for cloud services / Erdal Cayirci
- Managing risk in the cloud / Michaela Iorga and Anil Karmel
- Cloud security risk management / Marco Cremonini
- Secure cloud risk management: risk mitigation methods / James T. Harmening
- Specification and enforcement of access policies in emerging scenarios / Sabrina de Capitani di Vimercati, Sara Foresti, and Pierangela Samarati
- Cryptographic key management for data protection / Sarbari Gupta
- Cloud security access control: distributed access control / James T. Harmening and Randall DeVitto
- Cloud security key management: cloud user controls / Weiyu Jiang, Jingqiang Lin, Zhan Wang, Bo Chen, and Kun Sun
- Cloud computing security essentials and architecture / Michaela Iorga and Anil Karmel
- Cloud computing architecture and security concepts / Pramod Pandya and Riad Rahmo
- Secure cloud architecture / Pramod Pandya
- Locking down cloud servers / Thorsten Herre
- Third-party providers integrity assurance for data outsourcing / Jiawei Yuan and Shucheng Yu
- Negotiating cloud security requirements with vendors / Daniel S. Soper
- Managing legal compliance risk in the cloud and negotiating personal data protection requirements with vendors / Paolo Balboni
- Integrity assurance for data outsourcing / Reza Curtmola and Bo Chen
- Secure computation outsourcing / Shams Zawoad and Ragib Hasan
- Computation over encrypted data / Feng-Hao Liu
- Trusted computing technology / Felipe E. Medina
- Computing technology for trusted cloud security / Roberto Di Pietro, Flavio Lombardi, and Matteo Signorini
- Trusted computing technology and proposals for resolving cloud computing security problems / Tao Su, Antonio Lioy, and Nicola Barresi
- Assuring compliance with governement certification and accreditation regulations / Sarbari Gupta
- Government certification, accreditation, regulations, and compliance risks / Thorsten Herre
- Simplifying secure cloud computing environments with cloud data centers / Thorsten Herre
- Availability, recovery, and auditing across data centers / Reza Curtmola and Bo Chen
- Advanced security architectures for cloud computing / Albert Caballero
- Side-channel attacks and defenses on cloud traffic / Wen Ming Liu and Lingyu Wang
- Clouds are evil / John Strand
- Future directions in cloud computing security: risks and challenges / Mohammad Kamrul Islam and Rasib Khan
- Isbn
- 9781482260953
- Label
- Cloud computing security : foundations and challenges
- Title
- Cloud computing security
- Title remainder
- foundations and challenges
- Statement of responsibility
- edited by John R. Vacca
- Language
- eng
- Summary
- This handbook offers a comprehensive overview of cloud computing security technology and implementation, while exploring practical solutions to a wide range of cloud computing security issues. With more organizations using cloud computing and cloud providers for data operations, proper security in these and other potentially vulnerable areas have become a priority for organizations of all sizes across the globe. Research efforts from both academia and industry in all security aspects related to cloud computing are gathered within one reference guide. -- Provided by publisher
- Cataloging source
- N$T
- Dewey number
- 005.8
- Index
- index present
- LC call number
- QA76.585
- LC item number
- .C5825 2017eb
- Literary form
- non fiction
- Nature of contents
-
- dictionaries
- bibliography
- http://library.link/vocab/relatedWorkOrContributorName
- Vacca, John R.
- http://library.link/vocab/subjectName
-
- Cloud computing
- Computer networks
- Data protection
- Computer security
- COMPUTERS
- Computer networks
- Computer security
- Data protection
- Cloud Computing
- Datensicherung
- Label
- Cloud computing security : foundations and challenges, edited by John R. Vacca
- Bibliography note
- Includes bibliographical references and index
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Color
- mixed
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
- Cloud computing essentials / Anna Squicciarini, Daniela Oliveira, and Dan Lin -- Overview of cloud computing / William Stallings -- Cloud security baselines / Daniela Oliveira, Anna Squicciarini, and Dan Lin -- Cloud security, privacy, and trust baselines / Nikolaos Pitropakis, Sokratis K. Katsikas, and Costas Lambrinoudakis -- Infrastructure as a service (IaaS) / Mario Santana -- Risk and trust assessment: schemes for cloud services / Erdal Cayirci -- Managing risk in the cloud / Michaela Iorga and Anil Karmel -- Cloud security risk management / Marco Cremonini -- Secure cloud risk management: risk mitigation methods / James T. Harmening -- Specification and enforcement of access policies in emerging scenarios / Sabrina de Capitani di Vimercati, Sara Foresti, and Pierangela Samarati -- Cryptographic key management for data protection / Sarbari Gupta -- Cloud security access control: distributed access control / James T. Harmening and Randall DeVitto -- Cloud security key management: cloud user controls / Weiyu Jiang, Jingqiang Lin, Zhan Wang, Bo Chen, and Kun Sun -- Cloud computing security essentials and architecture / Michaela Iorga and Anil Karmel -- Cloud computing architecture and security concepts / Pramod Pandya and Riad Rahmo -- Secure cloud architecture / Pramod Pandya -- Locking down cloud servers / Thorsten Herre -- Third-party providers integrity assurance for data outsourcing / Jiawei Yuan and Shucheng Yu -- Negotiating cloud security requirements with vendors / Daniel S. Soper -- Managing legal compliance risk in the cloud and negotiating personal data protection requirements with vendors / Paolo Balboni -- Integrity assurance for data outsourcing / Reza Curtmola and Bo Chen -- Secure computation outsourcing / Shams Zawoad and Ragib Hasan -- Computation over encrypted data / Feng-Hao Liu -- Trusted computing technology / Felipe E. Medina -- Computing technology for trusted cloud security / Roberto Di Pietro, Flavio Lombardi, and Matteo Signorini -- Trusted computing technology and proposals for resolving cloud computing security problems / Tao Su, Antonio Lioy, and Nicola Barresi -- Assuring compliance with governement certification and accreditation regulations / Sarbari Gupta -- Government certification, accreditation, regulations, and compliance risks / Thorsten Herre -- Simplifying secure cloud computing environments with cloud data centers / Thorsten Herre -- Availability, recovery, and auditing across data centers / Reza Curtmola and Bo Chen -- Advanced security architectures for cloud computing / Albert Caballero -- Side-channel attacks and defenses on cloud traffic / Wen Ming Liu and Lingyu Wang -- Clouds are evil / John Strand -- Future directions in cloud computing security: risks and challenges / Mohammad Kamrul Islam and Rasib Khan
- Control code
- 959277888
- Dimensions
- unknown
- Extent
- 1 online resource (xxv, 492 pages)
- Form of item
- online
- Isbn
- 9781482260953
- Lccn
- 2016009645
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
-
- c
- http://library.link/vocab/ext/overdrive/overdriveId
- cl0500000805
- Specific material designation
- remote
- System control number
- (OCoLC)959277888
- Label
- Cloud computing security : foundations and challenges, edited by John R. Vacca
- Bibliography note
- Includes bibliographical references and index
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Color
- mixed
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
- Cloud computing essentials / Anna Squicciarini, Daniela Oliveira, and Dan Lin -- Overview of cloud computing / William Stallings -- Cloud security baselines / Daniela Oliveira, Anna Squicciarini, and Dan Lin -- Cloud security, privacy, and trust baselines / Nikolaos Pitropakis, Sokratis K. Katsikas, and Costas Lambrinoudakis -- Infrastructure as a service (IaaS) / Mario Santana -- Risk and trust assessment: schemes for cloud services / Erdal Cayirci -- Managing risk in the cloud / Michaela Iorga and Anil Karmel -- Cloud security risk management / Marco Cremonini -- Secure cloud risk management: risk mitigation methods / James T. Harmening -- Specification and enforcement of access policies in emerging scenarios / Sabrina de Capitani di Vimercati, Sara Foresti, and Pierangela Samarati -- Cryptographic key management for data protection / Sarbari Gupta -- Cloud security access control: distributed access control / James T. Harmening and Randall DeVitto -- Cloud security key management: cloud user controls / Weiyu Jiang, Jingqiang Lin, Zhan Wang, Bo Chen, and Kun Sun -- Cloud computing security essentials and architecture / Michaela Iorga and Anil Karmel -- Cloud computing architecture and security concepts / Pramod Pandya and Riad Rahmo -- Secure cloud architecture / Pramod Pandya -- Locking down cloud servers / Thorsten Herre -- Third-party providers integrity assurance for data outsourcing / Jiawei Yuan and Shucheng Yu -- Negotiating cloud security requirements with vendors / Daniel S. Soper -- Managing legal compliance risk in the cloud and negotiating personal data protection requirements with vendors / Paolo Balboni -- Integrity assurance for data outsourcing / Reza Curtmola and Bo Chen -- Secure computation outsourcing / Shams Zawoad and Ragib Hasan -- Computation over encrypted data / Feng-Hao Liu -- Trusted computing technology / Felipe E. Medina -- Computing technology for trusted cloud security / Roberto Di Pietro, Flavio Lombardi, and Matteo Signorini -- Trusted computing technology and proposals for resolving cloud computing security problems / Tao Su, Antonio Lioy, and Nicola Barresi -- Assuring compliance with governement certification and accreditation regulations / Sarbari Gupta -- Government certification, accreditation, regulations, and compliance risks / Thorsten Herre -- Simplifying secure cloud computing environments with cloud data centers / Thorsten Herre -- Availability, recovery, and auditing across data centers / Reza Curtmola and Bo Chen -- Advanced security architectures for cloud computing / Albert Caballero -- Side-channel attacks and defenses on cloud traffic / Wen Ming Liu and Lingyu Wang -- Clouds are evil / John Strand -- Future directions in cloud computing security: risks and challenges / Mohammad Kamrul Islam and Rasib Khan
- Control code
- 959277888
- Dimensions
- unknown
- Extent
- 1 online resource (xxv, 492 pages)
- Form of item
- online
- Isbn
- 9781482260953
- Lccn
- 2016009645
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
-
- c
- http://library.link/vocab/ext/overdrive/overdriveId
- cl0500000805
- Specific material designation
- remote
- System control number
- (OCoLC)959277888
Library Links
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.mst.edu/portal/Cloud-computing-security--foundations-and/vs7TGmHhfXg/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.mst.edu/portal/Cloud-computing-security--foundations-and/vs7TGmHhfXg/">Cloud computing security : foundations and challenges, edited by John R. Vacca</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.mst.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.mst.edu/">Missouri University of Science & Technology Library</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Item Cloud computing security : foundations and challenges, edited by John R. Vacca
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.mst.edu/portal/Cloud-computing-security--foundations-and/vs7TGmHhfXg/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.mst.edu/portal/Cloud-computing-security--foundations-and/vs7TGmHhfXg/">Cloud computing security : foundations and challenges, edited by John R. Vacca</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.mst.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.mst.edu/">Missouri University of Science & Technology Library</a></span></span></span></span></div>