Cloud computing security : foundations and challenges /
This handbook offers a comprehensive overview of cloud computing security technology and implementation, while exploring practical solutions to a wide range of cloud computing security issues. With more organizations using cloud computing and cloud providers for data operations, proper security in t...
Clasificación: | Libro Electrónico |
---|---|
Otros Autores: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Boca Raton :
CRC Press,
[2017]
|
Colección: | Online access with DDA: Askews (Maths)
|
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Tabla de Contenidos:
- Cloud computing essentials / Anna Squicciarini, Daniela Oliveira, and Dan Lin
- Overview of cloud computing / William Stallings
- Cloud security baselines / Daniela Oliveira, Anna Squicciarini, and Dan Lin
- Cloud security, privacy, and trust baselines / Nikolaos Pitropakis, Sokratis K. Katsikas, and Costas Lambrinoudakis
- Infrastructure as a service (IaaS) / Mario Santana
- Risk and trust assessment: schemes for cloud services / Erdal Cayirci
- Managing risk in the cloud / Michaela Iorga and Anil Karmel
- Cloud security risk management / Marco Cremonini
- Secure cloud risk management: risk mitigation methods / James T. Harmening
- Specification and enforcement of access policies in emerging scenarios / Sabrina de Capitani di Vimercati, Sara Foresti, and Pierangela Samarati
- Cryptographic key management for data protection / Sarbari Gupta
- Cloud security access control: distributed access control / James T. Harmening and Randall DeVitto
- Cloud security key management: cloud user controls / Weiyu Jiang, Jingqiang Lin, Zhan Wang, Bo Chen, and Kun Sun
- Cloud computing security essentials and architecture / Michaela Iorga and Anil Karmel
- Cloud computing architecture and security concepts / Pramod Pandya and Riad Rahmo
- Secure cloud architecture / Pramod Pandya
- Locking down cloud servers / Thorsten Herre
- Third-party providers integrity assurance for data outsourcing / Jiawei Yuan and Shucheng Yu
- Negotiating cloud security requirements with vendors / Daniel S. Soper
- Managing legal compliance risk in the cloud and negotiating personal data protection requirements with vendors / Paolo Balboni
- Integrity assurance for data outsourcing / Reza Curtmola and Bo Chen
- Secure computation outsourcing / Shams Zawoad and Ragib Hasan
- Computation over encrypted data / Feng-Hao Liu
- Trusted computing technology / Felipe E. Medina
- Computing technology for trusted cloud security / Roberto Di Pietro, Flavio Lombardi, and Matteo Signorini
- Trusted computing technology and proposals for resolving cloud computing security problems / Tao Su, Antonio Lioy, and Nicola Barresi
- Assuring compliance with governement certification and accreditation regulations / Sarbari Gupta
- Government certification, accreditation, regulations, and compliance risks / Thorsten Herre
- Simplifying secure cloud computing environments with cloud data centers / Thorsten Herre
- Availability, recovery, and auditing across data centers / Reza Curtmola and Bo Chen
- Advanced security architectures for cloud computing / Albert Caballero
- Side-channel attacks and defenses on cloud traffic / Wen Ming Liu and Lingyu Wang
- Clouds are evil / John Strand
- Future directions in cloud computing security: risks and challenges / Mohammad Kamrul Islam and Rasib Khan.