Cargando…

Cloud computing security : foundations and challenges /

This handbook offers a comprehensive overview of cloud computing security technology and implementation, while exploring practical solutions to a wide range of cloud computing security issues. With more organizations using cloud computing and cloud providers for data operations, proper security in t...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Vacca, John R. (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Boca Raton : CRC Press, [2017]
Colección:Online access with DDA: Askews (Maths)
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)
Tabla de Contenidos:
  • Cloud computing essentials / Anna Squicciarini, Daniela Oliveira, and Dan Lin
  • Overview of cloud computing / William Stallings
  • Cloud security baselines / Daniela Oliveira, Anna Squicciarini, and Dan Lin
  • Cloud security, privacy, and trust baselines / Nikolaos Pitropakis, Sokratis K. Katsikas, and Costas Lambrinoudakis
  • Infrastructure as a service (IaaS) / Mario Santana
  • Risk and trust assessment: schemes for cloud services / Erdal Cayirci
  • Managing risk in the cloud / Michaela Iorga and Anil Karmel
  • Cloud security risk management / Marco Cremonini
  • Secure cloud risk management: risk mitigation methods / James T. Harmening
  • Specification and enforcement of access policies in emerging scenarios / Sabrina de Capitani di Vimercati, Sara Foresti, and Pierangela Samarati
  • Cryptographic key management for data protection / Sarbari Gupta
  • Cloud security access control: distributed access control / James T. Harmening and Randall DeVitto
  • Cloud security key management: cloud user controls / Weiyu Jiang, Jingqiang Lin, Zhan Wang, Bo Chen, and Kun Sun
  • Cloud computing security essentials and architecture / Michaela Iorga and Anil Karmel
  • Cloud computing architecture and security concepts / Pramod Pandya and Riad Rahmo
  • Secure cloud architecture / Pramod Pandya
  • Locking down cloud servers / Thorsten Herre
  • Third-party providers integrity assurance for data outsourcing / Jiawei Yuan and Shucheng Yu
  • Negotiating cloud security requirements with vendors / Daniel S. Soper
  • Managing legal compliance risk in the cloud and negotiating personal data protection requirements with vendors / Paolo Balboni
  • Integrity assurance for data outsourcing / Reza Curtmola and Bo Chen
  • Secure computation outsourcing / Shams Zawoad and Ragib Hasan
  • Computation over encrypted data / Feng-Hao Liu
  • Trusted computing technology / Felipe E. Medina
  • Computing technology for trusted cloud security / Roberto Di Pietro, Flavio Lombardi, and Matteo Signorini
  • Trusted computing technology and proposals for resolving cloud computing security problems / Tao Su, Antonio Lioy, and Nicola Barresi
  • Assuring compliance with governement certification and accreditation regulations / Sarbari Gupta
  • Government certification, accreditation, regulations, and compliance risks / Thorsten Herre
  • Simplifying secure cloud computing environments with cloud data centers / Thorsten Herre
  • Availability, recovery, and auditing across data centers / Reza Curtmola and Bo Chen
  • Advanced security architectures for cloud computing / Albert Caballero
  • Side-channel attacks and defenses on cloud traffic / Wen Ming Liu and Lingyu Wang
  • Clouds are evil / John Strand
  • Future directions in cloud computing security: risks and challenges / Mohammad Kamrul Islam and Rasib Khan.