語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Cloud Security Auditing
~
Oqaily, Momen.
Cloud Security Auditing
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Cloud Security Auditing/ by Suryadipta Majumdar, Taous Madi, Yushun Wang, Azadeh Tabiban, Momen Oqaily, Amir Alimohammadifar, Yosr Jarraya, Makan Pourzandi, Lingyu Wang, Mourad Debbabi.
作者:
Majumdar, Suryadipta.
其他作者:
Madi, Taous.
面頁冊數:
XI, 166 p. 75 illus., 10 illus. in color.online resource. :
Contained By:
Springer Nature eBook
標題:
Data protection. -
電子資源:
https://doi.org/10.1007/978-3-030-23128-6
ISBN:
9783030231286
Cloud Security Auditing
Majumdar, Suryadipta.
Cloud Security Auditing
[electronic resource] /by Suryadipta Majumdar, Taous Madi, Yushun Wang, Azadeh Tabiban, Momen Oqaily, Amir Alimohammadifar, Yosr Jarraya, Makan Pourzandi, Lingyu Wang, Mourad Debbabi. - 1st ed. 2019. - XI, 166 p. 75 illus., 10 illus. in color.online resource. - Advances in Information Security,761568-2633 ;. - Advances in Information Security,.
1 Introduction -- 2 Literature Review -- 3 Auditing Security Compliance of Virtualized Infrastructure -- 4 Auditing Virtual Network Isolation across Cloud Layers -- 5 User-Level Runtime Security Auditing for the Cloud -- 6 Proactive Security Auditing in Clouds -- 7 Runtime Security Policy Enforcement in Clouds -- 8 Conclusion.
This book provides a comprehensive review of the most up to date research related to cloud security auditing and discusses auditing the cloud infrastructure from the structural point of view, while focusing on virtualization-related security properties and consistency between multiple control layers. It presents an off-line automated framework for auditing consistent isolation between virtual networks in OpenStack-managed cloud spanning over overlay and layer 2 by considering both cloud layers’ views. A runtime security auditing framework for the cloud with special focus on the user-level including common access control and authentication mechanisms e.g., RBAC, ABAC and SSO is covered as well. This book also discusses a learning-based proactive security auditing system, which extracts probabilistic dependencies between runtime events and applies such dependencies to proactively audit and prevent security violations resulting from critical events. Finally, this book elaborates the design and implementation of a middleware as a pluggable interface to OpenStack for intercepting and verifying the legitimacy of user requests at runtime. The authors discuss how state-of-the-art security auditing solutions may help increase cloud tenants’ trust in the service providers by providing assurance on the compliance with the applicable laws, regulations, policies, and standards. This book introduces the latest research results on both traditional retroactive auditing and novel (runtime and proactive) auditing techniques to serve different stakeholders in the cloud. This book covers security threats from different cloud abstraction levels and discusses a wide-range of security properties related to cloud-specific standards (e.g., Cloud Control Matrix (CCM) and ISO 27017). It also elaborates on the integration of security auditing solutions into real world cloud management platforms (e.g., OpenStack, Amazon AWS and Google GCP). This book targets industrial scientists, who are working on cloud or security-related topics, as well as security practitioners, administrators, cloud providers and operators. Researchers and advanced-level students studying and working in computer science, practically in cloud security will also be interested in this book.
ISBN: 9783030231286
Standard No.: 10.1007/978-3-030-23128-6doiSubjects--Topical Terms:
557764
Data protection.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Cloud Security Auditing
LDR
:04121nam a22004095i 4500
001
1006101
003
DE-He213
005
20200910064739.0
007
cr nn 008mamaa
008
210106s2019 gw | s |||| 0|eng d
020
$a
9783030231286
$9
978-3-030-23128-6
024
7
$a
10.1007/978-3-030-23128-6
$2
doi
035
$a
978-3-030-23128-6
050
4
$a
QA76.9.A25
072
7
$a
UR
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
082
0 4
$a
005.8
$2
23
100
1
$a
Majumdar, Suryadipta.
$e
author.
$0
(orcid)0000-0002-6501-4214
$1
https://orcid.org/0000-0002-6501-4214
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1299580
245
1 0
$a
Cloud Security Auditing
$h
[electronic resource] /
$c
by Suryadipta Majumdar, Taous Madi, Yushun Wang, Azadeh Tabiban, Momen Oqaily, Amir Alimohammadifar, Yosr Jarraya, Makan Pourzandi, Lingyu Wang, Mourad Debbabi.
250
$a
1st ed. 2019.
264
1
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2019.
300
$a
XI, 166 p. 75 illus., 10 illus. in color.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
490
1
$a
Advances in Information Security,
$x
1568-2633 ;
$v
76
505
0
$a
1 Introduction -- 2 Literature Review -- 3 Auditing Security Compliance of Virtualized Infrastructure -- 4 Auditing Virtual Network Isolation across Cloud Layers -- 5 User-Level Runtime Security Auditing for the Cloud -- 6 Proactive Security Auditing in Clouds -- 7 Runtime Security Policy Enforcement in Clouds -- 8 Conclusion.
520
$a
This book provides a comprehensive review of the most up to date research related to cloud security auditing and discusses auditing the cloud infrastructure from the structural point of view, while focusing on virtualization-related security properties and consistency between multiple control layers. It presents an off-line automated framework for auditing consistent isolation between virtual networks in OpenStack-managed cloud spanning over overlay and layer 2 by considering both cloud layers’ views. A runtime security auditing framework for the cloud with special focus on the user-level including common access control and authentication mechanisms e.g., RBAC, ABAC and SSO is covered as well. This book also discusses a learning-based proactive security auditing system, which extracts probabilistic dependencies between runtime events and applies such dependencies to proactively audit and prevent security violations resulting from critical events. Finally, this book elaborates the design and implementation of a middleware as a pluggable interface to OpenStack for intercepting and verifying the legitimacy of user requests at runtime. The authors discuss how state-of-the-art security auditing solutions may help increase cloud tenants’ trust in the service providers by providing assurance on the compliance with the applicable laws, regulations, policies, and standards. This book introduces the latest research results on both traditional retroactive auditing and novel (runtime and proactive) auditing techniques to serve different stakeholders in the cloud. This book covers security threats from different cloud abstraction levels and discusses a wide-range of security properties related to cloud-specific standards (e.g., Cloud Control Matrix (CCM) and ISO 27017). It also elaborates on the integration of security auditing solutions into real world cloud management platforms (e.g., OpenStack, Amazon AWS and Google GCP). This book targets industrial scientists, who are working on cloud or security-related topics, as well as security practitioners, administrators, cloud providers and operators. Researchers and advanced-level students studying and working in computer science, practically in cloud security will also be interested in this book.
650
0
$a
Data protection.
$3
557764
650
0
$a
Computer organization.
$3
596298
650
0
$a
Computers.
$3
565115
650
0
$a
Electrical engineering.
$3
596380
650
1 4
$a
Security.
$3
1114130
650
2 4
$a
Computer Systems Organization and Communication Networks.
$3
669309
650
2 4
$a
Information Systems and Communication Service.
$3
669203
650
2 4
$a
Communications Engineering, Networks.
$3
669809
700
1
$a
Madi, Taous.
$e
author.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1299581
700
1
$a
Wang, Yushun.
$e
author.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1299582
700
1
$a
Tabiban, Azadeh.
$e
author.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1299583
700
1
$a
Oqaily, Momen.
$e
author.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1299584
700
1
$a
Alimohammadifar, Amir.
$e
author.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1299585
700
1
$a
Jarraya, Yosr.
$e
author.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1299586
700
1
$a
Pourzandi, Makan.
$e
author.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1258108
700
1
$a
Wang, Lingyu.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1024773
700
1
$a
Debbabi, Mourad.
$e
author.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1258107
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9783030231279
776
0 8
$i
Printed edition:
$z
9783030231293
776
0 8
$i
Printed edition:
$z
9783030231309
830
0
$a
Advances in Information Security,
$x
1568-2633
$3
1256774
856
4 0
$u
https://doi.org/10.1007/978-3-030-23128-6
912
$a
ZDB-2-SCS
912
$a
ZDB-2-SXCS
950
$a
Computer Science (SpringerNature-11645)
950
$a
Computer Science (R0) (SpringerNature-43710)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入