Coverart for item
The Resource Cloud computing security : foundations and challenges, edited by John R. Vacca

Cloud computing security : foundations and challenges, edited by John R. Vacca

Label
Cloud computing security : foundations and challenges
Title
Cloud computing security
Title remainder
foundations and challenges
Statement of responsibility
edited by John R. Vacca
Contributor
Editor
Subject
Genre
Language
eng
Summary
This handbook offers a comprehensive overview of cloud computing security technology and implementation, while exploring practical solutions to a wide range of cloud computing security issues. With more organizations using cloud computing and cloud providers for data operations, proper security in these and other potentially vulnerable areas have become a priority for organizations of all sizes across the globe. Research efforts from both academia and industry in all security aspects related to cloud computing are gathered within one reference guide. -- Provided by publisher
Member of
Cataloging source
N$T
Dewey number
005.8
Index
index present
LC call number
QA76.585
LC item number
.C5825 2017eb
Literary form
non fiction
Nature of contents
  • dictionaries
  • bibliography
http://library.link/vocab/relatedWorkOrContributorName
Vacca, John R.
http://library.link/vocab/subjectName
  • Cloud computing
  • Computer networks
  • Data protection
  • Computer security
  • COMPUTERS
  • Computer networks
  • Computer security
  • Data protection
  • Cloud Computing
  • Datensicherung
Label
Cloud computing security : foundations and challenges, edited by John R. Vacca
Instantiates
Publication
Copyright
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Color
mixed
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
Cloud computing essentials / Anna Squicciarini, Daniela Oliveira, and Dan Lin -- Overview of cloud computing / William Stallings -- Cloud security baselines / Daniela Oliveira, Anna Squicciarini, and Dan Lin -- Cloud security, privacy, and trust baselines / Nikolaos Pitropakis, Sokratis K. Katsikas, and Costas Lambrinoudakis -- Infrastructure as a service (IaaS) / Mario Santana -- Risk and trust assessment: schemes for cloud services / Erdal Cayirci -- Managing risk in the cloud / Michaela Iorga and Anil Karmel -- Cloud security risk management / Marco Cremonini -- Secure cloud risk management: risk mitigation methods / James T. Harmening -- Specification and enforcement of access policies in emerging scenarios / Sabrina de Capitani di Vimercati, Sara Foresti, and Pierangela Samarati -- Cryptographic key management for data protection / Sarbari Gupta -- Cloud security access control: distributed access control / James T. Harmening and Randall DeVitto -- Cloud security key management: cloud user controls / Weiyu Jiang, Jingqiang Lin, Zhan Wang, Bo Chen, and Kun Sun -- Cloud computing security essentials and architecture / Michaela Iorga and Anil Karmel -- Cloud computing architecture and security concepts / Pramod Pandya and Riad Rahmo -- Secure cloud architecture / Pramod Pandya -- Locking down cloud servers / Thorsten Herre -- Third-party providers integrity assurance for data outsourcing / Jiawei Yuan and Shucheng Yu -- Negotiating cloud security requirements with vendors / Daniel S. Soper -- Managing legal compliance risk in the cloud and negotiating personal data protection requirements with vendors / Paolo Balboni -- Integrity assurance for data outsourcing / Reza Curtmola and Bo Chen -- Secure computation outsourcing / Shams Zawoad and Ragib Hasan -- Computation over encrypted data / Feng-Hao Liu -- Trusted computing technology / Felipe E. Medina -- Computing technology for trusted cloud security / Roberto Di Pietro, Flavio Lombardi, and Matteo Signorini -- Trusted computing technology and proposals for resolving cloud computing security problems / Tao Su, Antonio Lioy, and Nicola Barresi -- Assuring compliance with governement certification and accreditation regulations / Sarbari Gupta -- Government certification, accreditation, regulations, and compliance risks / Thorsten Herre -- Simplifying secure cloud computing environments with cloud data centers / Thorsten Herre -- Availability, recovery, and auditing across data centers / Reza Curtmola and Bo Chen -- Advanced security architectures for cloud computing / Albert Caballero -- Side-channel attacks and defenses on cloud traffic / Wen Ming Liu and Lingyu Wang -- Clouds are evil / John Strand -- Future directions in cloud computing security: risks and challenges / Mohammad Kamrul Islam and Rasib Khan
Control code
959277888
Dimensions
unknown
Extent
1 online resource (xxv, 492 pages)
Form of item
online
Isbn
9781482260953
Lccn
2016009645
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
http://library.link/vocab/ext/overdrive/overdriveId
cl0500000805
Specific material designation
remote
System control number
(OCoLC)959277888
Label
Cloud computing security : foundations and challenges, edited by John R. Vacca
Publication
Copyright
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Color
mixed
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
Cloud computing essentials / Anna Squicciarini, Daniela Oliveira, and Dan Lin -- Overview of cloud computing / William Stallings -- Cloud security baselines / Daniela Oliveira, Anna Squicciarini, and Dan Lin -- Cloud security, privacy, and trust baselines / Nikolaos Pitropakis, Sokratis K. Katsikas, and Costas Lambrinoudakis -- Infrastructure as a service (IaaS) / Mario Santana -- Risk and trust assessment: schemes for cloud services / Erdal Cayirci -- Managing risk in the cloud / Michaela Iorga and Anil Karmel -- Cloud security risk management / Marco Cremonini -- Secure cloud risk management: risk mitigation methods / James T. Harmening -- Specification and enforcement of access policies in emerging scenarios / Sabrina de Capitani di Vimercati, Sara Foresti, and Pierangela Samarati -- Cryptographic key management for data protection / Sarbari Gupta -- Cloud security access control: distributed access control / James T. Harmening and Randall DeVitto -- Cloud security key management: cloud user controls / Weiyu Jiang, Jingqiang Lin, Zhan Wang, Bo Chen, and Kun Sun -- Cloud computing security essentials and architecture / Michaela Iorga and Anil Karmel -- Cloud computing architecture and security concepts / Pramod Pandya and Riad Rahmo -- Secure cloud architecture / Pramod Pandya -- Locking down cloud servers / Thorsten Herre -- Third-party providers integrity assurance for data outsourcing / Jiawei Yuan and Shucheng Yu -- Negotiating cloud security requirements with vendors / Daniel S. Soper -- Managing legal compliance risk in the cloud and negotiating personal data protection requirements with vendors / Paolo Balboni -- Integrity assurance for data outsourcing / Reza Curtmola and Bo Chen -- Secure computation outsourcing / Shams Zawoad and Ragib Hasan -- Computation over encrypted data / Feng-Hao Liu -- Trusted computing technology / Felipe E. Medina -- Computing technology for trusted cloud security / Roberto Di Pietro, Flavio Lombardi, and Matteo Signorini -- Trusted computing technology and proposals for resolving cloud computing security problems / Tao Su, Antonio Lioy, and Nicola Barresi -- Assuring compliance with governement certification and accreditation regulations / Sarbari Gupta -- Government certification, accreditation, regulations, and compliance risks / Thorsten Herre -- Simplifying secure cloud computing environments with cloud data centers / Thorsten Herre -- Availability, recovery, and auditing across data centers / Reza Curtmola and Bo Chen -- Advanced security architectures for cloud computing / Albert Caballero -- Side-channel attacks and defenses on cloud traffic / Wen Ming Liu and Lingyu Wang -- Clouds are evil / John Strand -- Future directions in cloud computing security: risks and challenges / Mohammad Kamrul Islam and Rasib Khan
Control code
959277888
Dimensions
unknown
Extent
1 online resource (xxv, 492 pages)
Form of item
online
Isbn
9781482260953
Lccn
2016009645
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
http://library.link/vocab/ext/overdrive/overdriveId
cl0500000805
Specific material designation
remote
System control number
(OCoLC)959277888

Library Locations

    • Curtis Laws Wilson LibraryBorrow it
      400 West 14th Street, Rolla, MO, 65409, US
      37.955220 -91.772210
Processing Feedback ...