|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
KNOVEL_on1006044197 |
003 |
OCoLC |
005 |
20231027140348.0 |
006 |
m o d |
007 |
cr cn||||||||| |
008 |
171013s2017 enka ob 001 0 eng d |
040 |
|
|
|a IDEBK
|b eng
|e rda
|e pn
|c IDEBK
|d EBLCP
|d N$T
|d UIU
|d N$T
|d UAB
|d MCW
|d YDX
|d ESU
|d OCLCQ
|d MERUC
|d IDEBK
|d KNOVL
|d VRC
|d STF
|d OCLCQ
|d EZ9
|d OTZ
|d PHUST
|d OCLCQ
|d WYU
|d LVT
|d G3B
|d IGB
|d BRX
|d U3G
|d OCLCF
|d AU@
|d INT
|d CUV
|d UKAHL
|d OCLCQ
|d AGLDB
|d OCLCQ
|d OCLCO
|d OCLCQ
|
019 |
|
|
|a 1005592666
|a 1048386781
|a 1057431478
|a 1087420715
|a 1162915162
|a 1182839501
|
020 |
|
|
|a 9781785612213
|q (electronic bk.)
|
020 |
|
|
|a 1785612212
|q (electronic bk.)
|
020 |
|
|
|a 9781523112555
|q (electronic bk.)
|
020 |
|
|
|a 1523112557
|q (electronic bk.)
|
020 |
|
|
|z 9781785612206
|
020 |
|
|
|z 1785612204
|
029 |
1 |
|
|a AU@
|b 000061341429
|
029 |
1 |
|
|a AU@
|b 000062534459
|
029 |
1 |
|
|a AU@
|b 000062590895
|
035 |
|
|
|a (OCoLC)1006044197
|z (OCoLC)1005592666
|z (OCoLC)1048386781
|z (OCoLC)1057431478
|z (OCoLC)1087420715
|z (OCoLC)1162915162
|z (OCoLC)1182839501
|
037 |
|
|
|a 1041581
|b MIL
|
050 |
|
4 |
|a QA76.585
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
072 |
|
7 |
|a C0000
|2 inspec
|
072 |
|
7 |
|a C1110
|2 inspec
|
072 |
|
7 |
|a C6130B
|2 inspec
|
072 |
|
7 |
|a C6130S
|2 inspec
|
072 |
|
7 |
|a C6190J
|2 inspec
|
072 |
|
7 |
|a C7210N
|2 inspec
|
082 |
0 |
4 |
|a 005.8
|
049 |
|
|
|a UAMI
|
245 |
0 |
0 |
|a Data security in cloud computing /
|c edited by Vimal Kumar, Sivadon Chaisiri and Ryan Ko.
|
264 |
|
1 |
|a London :
|b The Institution of Engineering and Technology,
|c 2017.
|
300 |
|
|
|a 1 online resource :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a IET security series ;
|v 05
|
588 |
0 |
|
|a Print version record.
|
504 |
|
|
|a Includes bibliographical references and index.
|
505 |
0 |
|
|a Contents -- Preface -- 1. A data-centric view of cloud security / Vimal Kumar, Sivadon Chaisiri, and Ryan Ko -- 2. Nomad: a framework for ensuring data confidentiality in mission-critical cloud-based applications / Mamadou H. Diallo, Michael August, Roger Hallman, Megan Kline, Henry Au, and Scott M. Slayback -- 3. Preserving privacy in pre-classification volume ray-casting of 3D images / Manoranjan Mohanty, Muhammad Rizwan Asghar, and Giovanni Russello
|
505 |
8 |
|
|a 4. Multiprocessor system-on-chip for processing data in cloud computing / Arnab Kumar Biswas, S.K. Nandy, and Ranjani Narayan5. Distributing encoded data for private processing in the cloud / Mark A. Will and Ryan K.L. Ko -- 6. Data protection and mobility management for cloud / Dat Dang, Doan Hoang, and Priyadarsi Nanda -- 7. Understanding software-defined perimeter / Chenkang Tang, Vimal Kumar, and Sivadon Chaisiri -- 8. Security, trust, and privacy for cloud computing in Transportation Cyber-Physical Systems / Wenjia Li, Jonathan Voris, and N. Sertac Artan
|
505 |
8 |
|
|a 9. Review of data leakage attack techniques in cloud systems / Zirak Allaf and Mo Adda10. Cloud computing and personal data processing: sorting-out legal requirements / Ioulia Konstantinou and Irene Kamara -- 11. The Waikato Data Privacy Matrix / Craig Scoon and Ryan K.L. Ko -- 12. Data provenance in cloud / Alan Yu Shyang Tan, Sivadon Chaisiri, Ryan Ko Kok Leong, Geoff Holmes, and Bill Rogers -- 13. Security visualization for cloud computing: an overview / Jeffery Garae, Ryan K.L. Ko, and Mark Apperley
|
520 |
|
|
|a This one-stop reference covers a wide range of issues on data security in Cloud Computing ranging from accountability, to data provenance, identity and risk management.
|
590 |
|
|
|a Knovel
|b ACADEMIC - Software Engineering
|
650 |
|
0 |
|a Cloud computing
|x Security measures.
|
650 |
|
6 |
|a Infonuagique
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computer security.
|2 fast
|0 (OCoLC)fst00872484
|
650 |
|
7 |
|a Data protection.
|2 fast
|0 (OCoLC)fst00887958
|
650 |
|
7 |
|a Matrices.
|2 fast
|0 (OCoLC)fst01012399
|
650 |
|
7 |
|a Privacy.
|2 fast
|0 (OCoLC)fst01077437
|
650 |
|
7 |
|a cloud computing.
|2 inspect
|
650 |
|
7 |
|a cyber-physical systems.
|2 inspect
|
650 |
|
7 |
|a data privacy.
|2 inspect
|
650 |
|
7 |
|a data visualisation.
|2 inspect
|
650 |
|
7 |
|a matrix algebra.
|2 inspect
|
650 |
|
7 |
|a security of data.
|2 inspect
|
700 |
1 |
|
|a Kumar, Vimal,
|e editor.
|
700 |
1 |
|
|a Chaisiri, Sivadon,
|e editor.
|
700 |
1 |
|
|a Ko, Ryan,
|e editor.
|
776 |
0 |
8 |
|i Print version:
|t Data security in cloud computing.
|d London : The Institution of Engineering and Technology, 2017
|z 9781785612206
|w (OCoLC)982652721
|
830 |
|
0 |
|a IET security series ;
|v 5.
|
856 |
4 |
0 |
|u https://appknovel.uam.elogim.com/kn/resources/kpDSCC0001/toc
|z Texto completo
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH32766465
|
938 |
|
|
|a EBL - Ebook Library
|b EBLB
|n EBL5102786
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 1604230
|
938 |
|
|
|a ProQuest MyiLibrary Digital eBook Collection
|b IDEB
|n cis38114064
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 14870712
|
994 |
|
|
|a 92
|b IZTAP
|