|
|
|
|
LEADER |
00000nam a22000005i 4500 |
001 |
978-3-319-12718-7 |
003 |
DE-He213 |
005 |
20220115235009.0 |
007 |
cr nn 008mamaa |
008 |
141115s2014 sz | s |||| 0|eng d |
020 |
|
|
|a 9783319127187
|9 978-3-319-12718-7
|
024 |
7 |
|
|a 10.1007/978-3-319-12718-7
|2 doi
|
050 |
|
4 |
|a TK5105.5-5105.9
|
072 |
|
7 |
|a UKN
|2 bicssc
|
072 |
|
7 |
|a COM075000
|2 bisacsh
|
072 |
|
7 |
|a UKN
|2 thema
|
082 |
0 |
4 |
|a 004.6
|2 23
|
245 |
1 |
0 |
|a Trusted Cloud Computing
|h [electronic resource] /
|c edited by Helmut Krcmar, Ralf Reussner, Bernhard Rumpe.
|
250 |
|
|
|a 1st ed. 2014.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2014.
|
300 |
|
|
|a XIII, 331 p. 97 illus., 29 illus. in color.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
505 |
0 |
|
|a Part I Security and Privacy -- 1 GeneCloud: Secure Cloud Computing for Biomedical Research -- 2 Sealed Cloud - A Novel Approach to Safeguard against Insider Attacks -- 3 Side Channels in Secure Database Outsourcing on the Example of the MimoSecco Scheme -- 4 ReDS: A System for Revision-Secure Data Storage -- 5 Automatic Data Protection Certificates for Cloud-Services based on Secure Logging -- 6 A Trust Point-based Security Architecture for Sensor Data in the Cloud -- Part II Software Engineering and Software Quality -- 7 Quality Analysis Approaches for Cloud Services - Towards a Framework along the Customer's Activity Cycle -- 8 A Model-based Software Development Kit for the SensorCloud Platform -- 9 TRESOR - Towards the Realization of a Trusted Cloud Ecosystem -- 10 Towards Reliability Estimation of Large Systems-of-Systems with the Palladio Component Model -- Part III Platforms, Middleware and Integration -- 11 Data Protection in the Cloud - The MimoSecco Approach -- 12 Secure Database Outsourcing to the Cloud Using the MimoSecco Middleware -- 13 SensorCloud: Towards the Interdisciplinary Development of a Trustworthy Platform for Globally Interconnected Sensors and Actuators -- 14 Testbed for the Sensor Cloud -- 15 An Architecture for Trusted PaaS Cloud Computing for Personal Data -- 16 Privacy-Preserving Cloud Computing for Biomedical Research -- Part IV Social Aspects, Business Models and Standards -- 17 Designing a Business Model for a Cloud Marketplace for Healthcare -- 18 SensorCloud: Sociological Contextualization of an Innovative Cloud Platform -- 19 Cutting Through the Jungle of Cloud Computing Whitepapers: Development of an Evaluation Model.
|
520 |
|
|
|a This book documents the scientific results of the projects related to the Trusted Cloud Program, covering fundamental aspects of trust, security, and quality of service for cloud-based services and applications. These results aim to allow trustworthy IT applications in the cloud by providing a reliable and secure technical and legal framework. In this domain, business models, legislative circumstances, technical possibilities, and realizable security are closely interwoven and thus are addressed jointly. The book is organized in four parts on "Security and Privacy", "Software Engineering and Software Quality", "Platforms, Middleware and Integration", and "Social Aspects, Business Models and Standards". It thus provides a holistic view on technological, societal, and legal aspects, which are indispensable not only to ensure the security of cloud services and the data they process, but also to gain the trust of society, business, industry, and science in these services. The ultimate goal of the book, as well as of the Trusted Cloud Program in general, is to distribute these results to a broader audience in both academia and industry, and thus to help with the proliferation of "Industry 4.0" services.
|
650 |
|
0 |
|a Computer networks .
|
650 |
|
0 |
|a Data protection.
|
650 |
|
0 |
|a Software engineering.
|
650 |
|
0 |
|a Application software.
|
650 |
1 |
4 |
|a Computer Communication Networks.
|
650 |
2 |
4 |
|a Data and Information Security.
|
650 |
2 |
4 |
|a Software Engineering.
|
650 |
2 |
4 |
|a Computer and Information Systems Applications.
|
700 |
1 |
|
|a Krcmar, Helmut.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Reussner, Ralf.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Rumpe, Bernhard.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319127170
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319127194
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319385228
|
856 |
4 |
0 |
|u https://doi.uam.elogim.com/10.1007/978-3-319-12718-7
|z Texto Completo
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-SXCS
|
950 |
|
|
|a Computer Science (SpringerNature-11645)
|
950 |
|
|
|a Computer Science (R0) (SpringerNature-43710)
|