回首頁 到查詢結果 [ subject:"Cloud computing- Security measures." ]

Cloud security = concepts, methodolo...
Information Resources Management Association.

FindBook      Google Book      Amazon      博客來     
  • Cloud security = concepts, methodologies, tools, and applications /
  • 紀錄類型: 書目-電子資源 : Monograph/item
    正題名/作者: Cloud security/ Information Resources Management Association, editor.
    其他題名: concepts, methodologies, tools, and applications /
    出版者: Hershey, Pennsylvania :IGI Global, : [2019],
    面頁冊數: 1 online resource (4 v.)
    內容註: Volume I. Section 1. Fundamental concepts and theories. Chapter 1. Curtailing the threats to cloud computing in the fourth industrial revolution ; Chapter 2. Role of security mechanisms in the building blocks of the cloud infrastructure ; Chapter 3. A review of intrusion detection systems in cloud computing ; Chapter 4. Cloud-based platforms and infrastructures: provisioning physical and virtual networks ; Chapter 5. A comprehensive survey on trust issue and its deployed models in computing environment ; Chapter 6. Anomaly detection in cloud environments ; Chapter 7. Cloud database security issues and challenges ; Chapter 8. Approaches to cloud computing in the public sector: case studies in UK local government -- Section 2. Development and design methodologies. Chapter 9. A multi-dimensional mean failure cost model to enhance security of cloud computing systems ; Chapter 10. Enterprise security framework for enterprise cloud data centres ; Chapter 11. A security framework for secure cloud computing environments ; Chapter 12. Information security innovation: personalisation of security services in a mobile cloud infrastructure ; Chapter 13. Intelligent techniques for providing effective security to cloud databases ; Chapter 14. A TPM-based secure multi-cloud storage architecture grounded on erasure codes ; Chapter 15. Modeling the ranking of evaluation criteria for cloud services: the government organization perspective in India ; Chapter 16. A framework to secure medical image storage in cloud computing environment ; Chapter 17. A security-by-distribution approach to manage big data in a federation of untrustworthy clouds ; Chapter 18. Enhanced trust path between two entities in cloud computing environment ; Chapter 19. Architectural design of trusted platform for IaaS cloud computing ; Chapter 20. An adaptive enterprise architecture framework and implementation: towards global enterprises in the era of cloud/mobile IT/digital IT ; Chapter 21. An authentication technique for accessing de-duplicated data from private cloud using one time password ; Chapter 22. A comprehensive survey on techniques based on TPM for ensuring the confidentiality in cloud data centers ; Chapter 23. Strategic planning for cloud computing adoption in STEM education: finding best practice solutions ; Chapter 24. The dynamic data privacy protection strategy based on the CAP theory ; Chapter 25. A novel multi-secret sharing approach for secure data warehousing and on-Line analysis processing in the cloud ; Chapter 26. A secured real time scheduling model for cloud hypervisor -- Section 3. Tools and technologies. Chapter 27. CCCE: cryptographic cloud computing environment based on quantum computations -- Volume II. Chapter 28. Role of agents to enhance the security and scalability in cloud environment ; Chapter 29. Runtime reusable weaving model for cloud services using aspect-oriented programming: the security-related aspect ; Chapter 30. Security in ad hoc network and computing paradigms ; Chapter 31. A proactive approach to intrusion detection in cloud software as a service ; Chapter 32. Cryptography in big data security ; Chapter 33. Glorified secure search schema over encrypted secure cloud storage with a hierarchical clustering computation ; Chapter 34. Classification of file data based on confidentiality in cloud computing using K-NN classifier ; Chapter 35. Access control framework for cloud computing ; Chapter 36. Cloud computing data storage security based on different encryption schemes ; Chapter 37. Healthcare saas based on a data model with built-in security and privacy ; Chapter 38. Security model for mobile cloud database as a service (DBaaS) ; Chapter 39. Securely communicating with an optimal cloud for intelligently enhancing a cloud's elasticity ; Chapter 40. Semantic electronic commerce architecture and models in cloud ; Chapter 41. Better security and encryption within cloud computing systems ; Chapter 42. Analyzing virtualization vulnerabilities and design a secure cloud environment to prevent from XSS attack ; Chapter 43. Cloud and cyber security through Crypt-Iris-based authentication approach ; Chapter 44. Trusted cloud- and femtocell-based biometric authentication for mobile networks ; Chapter 45. Modelling of cloud computing enablers using MICMAC analysis and TISM ; Chapter 46. Byzantine fault-tolerant architecture in cloud data management ; Chapter 47. A credible cloud service model based on behavior graphs and tripartite decision-making mechanism ; Chapter 48. Keystroke dynamics authentication in cloud computing: a survey -- Section 4. Utilization and applications. Chapter 49. Cloud computing and cybersecurity issues facing local enterprises ; Chapter 50. Data security and privacy assurance considerations in cloud computing for health insurance providers ; Chapter 51. Identification of various privacy and trust issues in cloud computing environment ; Chapter 52. Cryptographic cloud computing environment as a more trusted communication environment ; Chapter 53. Solutions for securing end user data over the cloud deployed applications ; Chapter 54. KIET framework for cloud adoption: Indian banking case study ; Chapter 55. Vehicular cloud computing challenges and security ; Chapter 56. A randomized cloud library security environment -- Volume III. Chapter 57. Secure mobile multi cloud architecture for authentication and data storage ; Chapter 58. Data storage security service in cloud computing: challenges and solutions ; Chapter 59. Digital forensics in distributed environment ; Chapter 60. Cloud auditor loyalty checking process using dual signature ; Chapter 61. Security in cloud of things (CoT) ; Chapter 62. Data security in wired and wireless systems ; Chapter 63. Cloud computing applications in the public sector ; Chapter 64. Data integrity in mobile cloud computing ; Chapter 65. Cloud security using 2-factor image authentication technique ; Chapter 66. Challenges of cloud computing adoption from the TOE framework perspective ; Chapter 67. The benefits of cloud computing: evidence from Greece ; Chapter 68. Mobile cloud gaming and today's world ; Chapter 69. Awareness of sustainability, green IT, and cloud computing in Indian organisations ; Chapter 70. A cloud-based architecture for interactive e-training ; Chapter 71. Necessity of key aggregation cryptosystem for data sharing in cloud computing -- Section 5. Organizational and social implications. Chapter 72. Impact of technology innovation: a study on cloud risk mitigation ; Chapter 73. A review of security challenges in cloud storage of big data ; Chapter 74. Why we disclose personal information despite cybersecurity risks and vulnerabilities: obligatory passage point perspective ; Chapter 75. Trust, privacy, issues in cloud-based healthcare services ; Chapter 76. The role of service recovery in online privacy violation ; Chapter 77. A cloud based solution for collaborative and secure sharing of medical data ; Chapter 78. Trust relationship establishment among multiple cloud service provider ; Chapter 79. The attitudes of Chinese organizations towards cloud computing: an exploratory study ; Chapter 80. Security and privacy issues of big data ; Chapter 81. SOHO users' perceptions of reliability and continuity of cloud-based services -- Volume IV. Chapter 82. Examining the contributing factors for cloud computing adoption in a developing country ; Chapter 83. Trust management in cloud computing -- Section 6. Managerial impact. Chapter 84. The collaborative use of patients' health-related information: challenges and research problems in a networked world ; Chapter 85. Cloud computing in the 21st century: a managerial perspective for policies and practices ; Chapter 86. Security risks of biomedical data processing in cloud computing environment ; Chapter 87. Meeting compliance requirements while using cloud services ; Chapter 88.
    內容註: Legal issues surrounding connected government services: a closer look at g-clouds ; Chapter 89. Investigating the determinants of decision-making on adoption of public cloud computing in e-government ; Chapter 90. Communication privacy management and mobile phone use ; Chapter 91. Benefits and challenges for BPM in the cloud ; Chapter 92. Security and privacy issues in cloud-based e-government ; Chapter 93. Smart healthcare administration over cloud -- Section 7. Critical issues and challenges. Chapter 94. A comparative study of privacy protection practices in the US, Europe, and Asia ; Chapter 95. Survey on ddos attacks and defense mechanisms in cloud and fog computing ; Chapter 96. Multi-aspect DDOS detection system for securing cloud network ; Chapter 97. Session hijacking over cloud environment: a literature survey ; Chapter 98. Impact of big data on security: big data security issues and defense schemes ; Chapter 99. Investigating the determinants of IT professionals' intention to use cloud-based applications and solutions: an extension of the technology acceptance ; Chapter 100. Privacy preserving public auditing in cloud: literature review -- Section 8. Emerging trends. Chapter 101. Advances in information, security, privacy and ethics: use of cloud computing for education ; Chapter 102. On developing fair and orderly cloud markets: qos- and security-aware optimization of cloud collaboration ; Chapter 103. The much needed security and data reforms of cloud computing in medical data storage ; Chapter 104. Deployment and optimization for cloud computing technologies in IoT ; Chapter 105. Trust in an enterprise world: a survey ; Chapter 106. Challenges and opportunities in vehicular cloud computing ; Chapter 107. Future directions to the application of distributed fog computing in smart grid systems ; Chapter 108. Emerging cloud computing services: a brief opinion article.
    標題: Cloud computing - Security measures. -
    電子資源: http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8176-5
    ISBN: 9781522581772 (e-book)
館藏地:  出版年:  卷號: 
館藏
  • 1 筆 • 頁數 1 •
 
W9371532 電子資源 11.線上閱覽_V 電子書 EB QA76.585 .C5864 2019e 一般使用(Normal) 在架 0
  • 1 筆 • 頁數 1 •
多媒體
評論
Export
取書館
 
 
變更密碼
登入