語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Modern principles, practices, and al...
~
Gupta, Brij, (1982-)
Modern principles, practices, and algorithms for cloud security
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Modern principles, practices, and algorithms for cloud security/ edited by Brij B. Gupta.
其他作者:
Gupta, Brij,
出版者:
Hershey, Pennsylvania :IGI Global, : 2019.,
面頁冊數:
1 online resource (xvii, 344 p.)
標題:
Cloud computing - Security measures. -
電子資源:
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-1082-7
ISBN:
9781799810841 (ebk.)
Modern principles, practices, and algorithms for cloud security
Modern principles, practices, and algorithms for cloud security
[electronic resource] /edited by Brij B. Gupta. - Hershey, Pennsylvania :IGI Global,2019. - 1 online resource (xvii, 344 p.)
Includes bibliographical references and index.
Chapter 1. Security- and privacy-aware computing in cloud with user mobility: an extensive review -- Chapter 2. Recent advances delivered in mobile cloud computing's security and management challenges -- Chapter 3. Security for cross-tenant access control in cloud computing -- Chapter 4. Secure identity-based proxy signature with computational diffie-Hellman for cloud data management -- Chapter 5. Cloud computing adoption: a scale development approach -- Chapter 6. A computational approach for secure cloud computing environments -- Chapter 7. Security threats and recent countermeasures in cloud computing -- Chapter 8. A framework strategy to overcome trust issues on cloud computing adoption in higher education -- Chapter 9. A proposal of improvement for transmission channels in cloud environments using the CBEDE methodology -- Chapter 10. Meta-heuristic and non-meta-heuristic energy-efficient load balancing algorithms in cloud computing -- Chapter 11. Distributed algorithms for finding meta-paths of a large heterogeneous information network on cloud -- Chapter 12. A tree computing block chain protocol crypto-signature model -- Chapter 13. Automate model transformation from CIM to PIM up to PSM in model-driven architecture.
Restricted to subscribers or individual electronic text purchasers.
"This book examines the principles, algorithms, applications, and practices of security in cloud computing"--
ISBN: 9781799810841 (ebk.)Subjects--Topical Terms:
775821
Cloud computing
--Security measures.
LC Class. No.: QA76.585 / .M6434 2019e
Dewey Class. No.: 004.67/82
Modern principles, practices, and algorithms for cloud security
LDR
:02355nam a2200277 a 4500
001
1017001
003
IGIG
005
20201224101415.0
006
m o d
007
cr cn
008
210122s2019 pau fob 001 0 eng d
020
$a
9781799810841 (ebk.)
020
$a
9781799810827 (hbk.)
020
$a
9781799810834 (pbk.)
035
$a
(OCoLC)1122549004
035
$a
1091218064
040
$a
CaBNVSL
$b
eng
$c
CaBNVSL
$d
CaBNVSL
050
0 0
$a
QA76.585
$b
.M6434 2019e
082
0 0
$a
004.67/82
$2
23
245
0 0
$a
Modern principles, practices, and algorithms for cloud security
$h
[electronic resource] /
$c
edited by Brij B. Gupta.
260
$a
Hershey, Pennsylvania :
$b
IGI Global,
$c
2019.
300
$a
1 online resource (xvii, 344 p.)
504
$a
Includes bibliographical references and index.
505
0
$a
Chapter 1. Security- and privacy-aware computing in cloud with user mobility: an extensive review -- Chapter 2. Recent advances delivered in mobile cloud computing's security and management challenges -- Chapter 3. Security for cross-tenant access control in cloud computing -- Chapter 4. Secure identity-based proxy signature with computational diffie-Hellman for cloud data management -- Chapter 5. Cloud computing adoption: a scale development approach -- Chapter 6. A computational approach for secure cloud computing environments -- Chapter 7. Security threats and recent countermeasures in cloud computing -- Chapter 8. A framework strategy to overcome trust issues on cloud computing adoption in higher education -- Chapter 9. A proposal of improvement for transmission channels in cloud environments using the CBEDE methodology -- Chapter 10. Meta-heuristic and non-meta-heuristic energy-efficient load balancing algorithms in cloud computing -- Chapter 11. Distributed algorithms for finding meta-paths of a large heterogeneous information network on cloud -- Chapter 12. A tree computing block chain protocol crypto-signature model -- Chapter 13. Automate model transformation from CIM to PIM up to PSM in model-driven architecture.
506
$a
Restricted to subscribers or individual electronic text purchasers.
520
3
$a
"This book examines the principles, algorithms, applications, and practices of security in cloud computing"--
$c
Provided by publisher.
650
0
$a
Cloud computing
$x
Security measures.
$3
775821
700
1
$a
Gupta, Brij,
$d
1982-
$e
editor.
$3
1133066
856
4 0
$u
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-1082-7
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入