語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Cloud security = concepts, methodolo...
~
Information Resources Management Association.
Cloud security = concepts, methodologies, tools, and applications /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Cloud security/ Information Resources Management Association, editor.
其他題名:
concepts, methodologies, tools, and applications /
出版者:
Hershey, Pennsylvania :IGI Global, : [2019],
面頁冊數:
1 online resource (4 v.)
標題:
Cloud computing - Security measures. -
電子資源:
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8176-5
ISBN:
9781522581772 (e-book)
Cloud security = concepts, methodologies, tools, and applications /
Cloud security
concepts, methodologies, tools, and applications /[electronic resource] :Information Resources Management Association, editor. - Hershey, Pennsylvania :IGI Global,[2019] - 1 online resource (4 v.)
Includes bibliographical references and index.
Volume I. Section 1. Fundamental concepts and theories. Chapter 1. Curtailing the threats to cloud computing in the fourth industrial revolution ; Chapter 2. Role of security mechanisms in the building blocks of the cloud infrastructure ; Chapter 3. A review of intrusion detection systems in cloud computing ; Chapter 4. Cloud-based platforms and infrastructures: provisioning physical and virtual networks ; Chapter 5. A comprehensive survey on trust issue and its deployed models in computing environment ; Chapter 6. Anomaly detection in cloud environments ; Chapter 7. Cloud database security issues and challenges ; Chapter 8. Approaches to cloud computing in the public sector: case studies in UK local government -- Section 2. Development and design methodologies. Chapter 9. A multi-dimensional mean failure cost model to enhance security of cloud computing systems ; Chapter 10. Enterprise security framework for enterprise cloud data centres ; Chapter 11. A security framework for secure cloud computing environments ; Chapter 12. Information security innovation: personalisation of security services in a mobile cloud infrastructure ; Chapter 13. Intelligent techniques for providing effective security to cloud databases ; Chapter 14. A TPM-based secure multi-cloud storage architecture grounded on erasure codes ; Chapter 15. Modeling the ranking of evaluation criteria for cloud services: the government organization perspective in India ; Chapter 16. A framework to secure medical image storage in cloud computing environment ; Chapter 17. A security-by-distribution approach to manage big data in a federation of untrustworthy clouds ; Chapter 18. Enhanced trust path between two entities in cloud computing environment ; Chapter 19. Architectural design of trusted platform for IaaS cloud computing ; Chapter 20. An adaptive enterprise architecture framework and implementation: towards global enterprises in the era of cloud/mobile IT/digital IT ; Chapter 21. An authentication technique for accessing de-duplicated data from private cloud using one time password ; Chapter 22. A comprehensive survey on techniques based on TPM for ensuring the confidentiality in cloud data centers ; Chapter 23. Strategic planning for cloud computing adoption in STEM education: finding best practice solutions ; Chapter 24. The dynamic data privacy protection strategy based on the CAP theory ; Chapter 25. A novel multi-secret sharing approach for secure data warehousing and on-Line analysis processing in the cloud ; Chapter 26. A secured real time scheduling model for cloud hypervisor -- Section 3. Tools and technologies. Chapter 27. CCCE: cryptographic cloud computing environment based on quantum computations -- Volume II. Chapter 28. Role of agents to enhance the security and scalability in cloud environment ; Chapter 29. Runtime reusable weaving model for cloud services using aspect-oriented programming: the security-related aspect ; Chapter 30. Security in ad hoc network and computing paradigms ; Chapter 31. A proactive approach to intrusion detection in cloud software as a service ; Chapter 32. Cryptography in big data security ; Chapter 33. Glorified secure search schema over encrypted secure cloud storage with a hierarchical clustering computation ; Chapter 34. Classification of file data based on confidentiality in cloud computing using K-NN classifier ; Chapter 35. Access control framework for cloud computing ; Chapter 36. Cloud computing data storage security based on different encryption schemes ; Chapter 37. Healthcare saas based on a data model with built-in security and privacy ; Chapter 38. Security model for mobile cloud database as a service (DBaaS) ; Chapter 39. Securely communicating with an optimal cloud for intelligently enhancing a cloud's elasticity ; Chapter 40. Semantic electronic commerce architecture and models in cloud ; Chapter 41. Better security and encryption within cloud computing systems ; Chapter 42. Analyzing virtualization vulnerabilities and design a secure cloud environment to prevent from XSS attack ; Chapter 43. Cloud and cyber security through Crypt-Iris-based authentication approach ; Chapter 44. Trusted cloud- and femtocell-based biometric authentication for mobile networks ; Chapter 45. Modelling of cloud computing enablers using MICMAC analysis and TISM ; Chapter 46. Byzantine fault-tolerant architecture in cloud data management ; Chapter 47. A credible cloud service model based on behavior graphs and tripartite decision-making mechanism ; Chapter 48. Keystroke dynamics authentication in cloud computing: a survey -- Section 4. Utilization and applications. Chapter 49. Cloud computing and cybersecurity issues facing local enterprises ; Chapter 50. Data security and privacy assurance considerations in cloud computing for health insurance providers ; Chapter 51. Identification of various privacy and trust issues in cloud computing environment ; Chapter 52. Cryptographic cloud computing environment as a more trusted communication environment ; Chapter 53. Solutions for securing end user data over the cloud deployed applications ; Chapter 54. KIET framework for cloud adoption: Indian banking case study ; Chapter 55. Vehicular cloud computing challenges and security ; Chapter 56. A randomized cloud library security environment -- Volume III. Chapter 57. Secure mobile multi cloud architecture for authentication and data storage ; Chapter 58. Data storage security service in cloud computing: challenges and solutions ; Chapter 59. Digital forensics in distributed environment ; Chapter 60. Cloud auditor loyalty checking process using dual signature ; Chapter 61. Security in cloud of things (CoT) ; Chapter 62. Data security in wired and wireless systems ; Chapter 63. Cloud computing applications in the public sector ; Chapter 64. Data integrity in mobile cloud computing ; Chapter 65. Cloud security using 2-factor image authentication technique ; Chapter 66. Challenges of cloud computing adoption from the TOE framework perspective ; Chapter 67. The benefits of cloud computing: evidence from Greece ; Chapter 68. Mobile cloud gaming and today's world ; Chapter 69. Awareness of sustainability, green IT, and cloud computing in Indian organisations ; Chapter 70. A cloud-based architecture for interactive e-training ; Chapter 71. Necessity of key aggregation cryptosystem for data sharing in cloud computing -- Section 5. Organizational and social implications. Chapter 72. Impact of technology innovation: a study on cloud risk mitigation ; Chapter 73. A review of security challenges in cloud storage of big data ; Chapter 74. Why we disclose personal information despite cybersecurity risks and vulnerabilities: obligatory passage point perspective ; Chapter 75. Trust, privacy, issues in cloud-based healthcare services ; Chapter 76. The role of service recovery in online privacy violation ; Chapter 77. A cloud based solution for collaborative and secure sharing of medical data ; Chapter 78. Trust relationship establishment among multiple cloud service provider ; Chapter 79. The attitudes of Chinese organizations towards cloud computing: an exploratory study ; Chapter 80. Security and privacy issues of big data ; Chapter 81. SOHO users' perceptions of reliability and continuity of cloud-based services -- Volume IV. Chapter 82. Examining the contributing factors for cloud computing adoption in a developing country ; Chapter 83. Trust management in cloud computing -- Section 6. Managerial impact. Chapter 84. The collaborative use of patients' health-related information: challenges and research problems in a networked world ; Chapter 85. Cloud computing in the 21st century: a managerial perspective for policies and practices ; Chapter 86. Security risks of biomedical data processing in cloud computing environment ; Chapter 87. Meeting compliance requirements while using cloud services ; Chapter 88.
Restricted to subscribers or individual electronic text purchasers.
"This book explores the difficulties and challenges of securing user data and information on cloud platforms. It also examines the current approaches to cloud-based technologies and assesses the possibilities for future advancements in this field. Highlighting a range of topics such as cloud forensics, information privacy, and standardization and security in the cloud"--Provided by publisher.
ISBN: 9781522581772 (e-book)Subjects--Topical Terms:
775821
Cloud computing
--Security measures.
LC Class. No.: QA76.585 / .C5864 2019e
Dewey Class. No.: 004.67/82
Cloud security = concepts, methodologies, tools, and applications /
LDR
:11256nam a2200289 a 4500
001
947537
003
IGIG
005
20191028114313.0
006
m o d
007
cr cn
008
200604s2019 pau fob 001 0 eng d
010
$z
2018048047
020
$a
9781522581772 (e-book)
020
$a
9781522581765 (hardback)
035
$a
(OCoLC)1089933925
035
$a
1081021247
040
$a
CaBNVSL
$b
eng
$c
CaBNVSL
$d
CaBNVSL
050
0 0
$a
QA76.585
$b
.C5864 2019e
082
0 0
$a
004.67/82
$2
23
245
0 0
$a
Cloud security
$h
[electronic resource] :
$b
concepts, methodologies, tools, and applications /
$c
Information Resources Management Association, editor.
260
$a
Hershey, Pennsylvania :
$b
IGI Global,
$c
[2019]
300
$a
1 online resource (4 v.)
504
$a
Includes bibliographical references and index.
505
0
$a
Volume I. Section 1. Fundamental concepts and theories. Chapter 1. Curtailing the threats to cloud computing in the fourth industrial revolution ; Chapter 2. Role of security mechanisms in the building blocks of the cloud infrastructure ; Chapter 3. A review of intrusion detection systems in cloud computing ; Chapter 4. Cloud-based platforms and infrastructures: provisioning physical and virtual networks ; Chapter 5. A comprehensive survey on trust issue and its deployed models in computing environment ; Chapter 6. Anomaly detection in cloud environments ; Chapter 7. Cloud database security issues and challenges ; Chapter 8. Approaches to cloud computing in the public sector: case studies in UK local government -- Section 2. Development and design methodologies. Chapter 9. A multi-dimensional mean failure cost model to enhance security of cloud computing systems ; Chapter 10. Enterprise security framework for enterprise cloud data centres ; Chapter 11. A security framework for secure cloud computing environments ; Chapter 12. Information security innovation: personalisation of security services in a mobile cloud infrastructure ; Chapter 13. Intelligent techniques for providing effective security to cloud databases ; Chapter 14. A TPM-based secure multi-cloud storage architecture grounded on erasure codes ; Chapter 15. Modeling the ranking of evaluation criteria for cloud services: the government organization perspective in India ; Chapter 16. A framework to secure medical image storage in cloud computing environment ; Chapter 17. A security-by-distribution approach to manage big data in a federation of untrustworthy clouds ; Chapter 18. Enhanced trust path between two entities in cloud computing environment ; Chapter 19. Architectural design of trusted platform for IaaS cloud computing ; Chapter 20. An adaptive enterprise architecture framework and implementation: towards global enterprises in the era of cloud/mobile IT/digital IT ; Chapter 21. An authentication technique for accessing de-duplicated data from private cloud using one time password ; Chapter 22. A comprehensive survey on techniques based on TPM for ensuring the confidentiality in cloud data centers ; Chapter 23. Strategic planning for cloud computing adoption in STEM education: finding best practice solutions ; Chapter 24. The dynamic data privacy protection strategy based on the CAP theory ; Chapter 25. A novel multi-secret sharing approach for secure data warehousing and on-Line analysis processing in the cloud ; Chapter 26. A secured real time scheduling model for cloud hypervisor -- Section 3. Tools and technologies. Chapter 27. CCCE: cryptographic cloud computing environment based on quantum computations -- Volume II. Chapter 28. Role of agents to enhance the security and scalability in cloud environment ; Chapter 29. Runtime reusable weaving model for cloud services using aspect-oriented programming: the security-related aspect ; Chapter 30. Security in ad hoc network and computing paradigms ; Chapter 31. A proactive approach to intrusion detection in cloud software as a service ; Chapter 32. Cryptography in big data security ; Chapter 33. Glorified secure search schema over encrypted secure cloud storage with a hierarchical clustering computation ; Chapter 34. Classification of file data based on confidentiality in cloud computing using K-NN classifier ; Chapter 35. Access control framework for cloud computing ; Chapter 36. Cloud computing data storage security based on different encryption schemes ; Chapter 37. Healthcare saas based on a data model with built-in security and privacy ; Chapter 38. Security model for mobile cloud database as a service (DBaaS) ; Chapter 39. Securely communicating with an optimal cloud for intelligently enhancing a cloud's elasticity ; Chapter 40. Semantic electronic commerce architecture and models in cloud ; Chapter 41. Better security and encryption within cloud computing systems ; Chapter 42. Analyzing virtualization vulnerabilities and design a secure cloud environment to prevent from XSS attack ; Chapter 43. Cloud and cyber security through Crypt-Iris-based authentication approach ; Chapter 44. Trusted cloud- and femtocell-based biometric authentication for mobile networks ; Chapter 45. Modelling of cloud computing enablers using MICMAC analysis and TISM ; Chapter 46. Byzantine fault-tolerant architecture in cloud data management ; Chapter 47. A credible cloud service model based on behavior graphs and tripartite decision-making mechanism ; Chapter 48. Keystroke dynamics authentication in cloud computing: a survey -- Section 4. Utilization and applications. Chapter 49. Cloud computing and cybersecurity issues facing local enterprises ; Chapter 50. Data security and privacy assurance considerations in cloud computing for health insurance providers ; Chapter 51. Identification of various privacy and trust issues in cloud computing environment ; Chapter 52. Cryptographic cloud computing environment as a more trusted communication environment ; Chapter 53. Solutions for securing end user data over the cloud deployed applications ; Chapter 54. KIET framework for cloud adoption: Indian banking case study ; Chapter 55. Vehicular cloud computing challenges and security ; Chapter 56. A randomized cloud library security environment -- Volume III. Chapter 57. Secure mobile multi cloud architecture for authentication and data storage ; Chapter 58. Data storage security service in cloud computing: challenges and solutions ; Chapter 59. Digital forensics in distributed environment ; Chapter 60. Cloud auditor loyalty checking process using dual signature ; Chapter 61. Security in cloud of things (CoT) ; Chapter 62. Data security in wired and wireless systems ; Chapter 63. Cloud computing applications in the public sector ; Chapter 64. Data integrity in mobile cloud computing ; Chapter 65. Cloud security using 2-factor image authentication technique ; Chapter 66. Challenges of cloud computing adoption from the TOE framework perspective ; Chapter 67. The benefits of cloud computing: evidence from Greece ; Chapter 68. Mobile cloud gaming and today's world ; Chapter 69. Awareness of sustainability, green IT, and cloud computing in Indian organisations ; Chapter 70. A cloud-based architecture for interactive e-training ; Chapter 71. Necessity of key aggregation cryptosystem for data sharing in cloud computing -- Section 5. Organizational and social implications. Chapter 72. Impact of technology innovation: a study on cloud risk mitigation ; Chapter 73. A review of security challenges in cloud storage of big data ; Chapter 74. Why we disclose personal information despite cybersecurity risks and vulnerabilities: obligatory passage point perspective ; Chapter 75. Trust, privacy, issues in cloud-based healthcare services ; Chapter 76. The role of service recovery in online privacy violation ; Chapter 77. A cloud based solution for collaborative and secure sharing of medical data ; Chapter 78. Trust relationship establishment among multiple cloud service provider ; Chapter 79. The attitudes of Chinese organizations towards cloud computing: an exploratory study ; Chapter 80. Security and privacy issues of big data ; Chapter 81. SOHO users' perceptions of reliability and continuity of cloud-based services -- Volume IV. Chapter 82. Examining the contributing factors for cloud computing adoption in a developing country ; Chapter 83. Trust management in cloud computing -- Section 6. Managerial impact. Chapter 84. The collaborative use of patients' health-related information: challenges and research problems in a networked world ; Chapter 85. Cloud computing in the 21st century: a managerial perspective for policies and practices ; Chapter 86. Security risks of biomedical data processing in cloud computing environment ; Chapter 87. Meeting compliance requirements while using cloud services ; Chapter 88.
505
0
$a
Legal issues surrounding connected government services: a closer look at g-clouds ; Chapter 89. Investigating the determinants of decision-making on adoption of public cloud computing in e-government ; Chapter 90. Communication privacy management and mobile phone use ; Chapter 91. Benefits and challenges for BPM in the cloud ; Chapter 92. Security and privacy issues in cloud-based e-government ; Chapter 93. Smart healthcare administration over cloud -- Section 7. Critical issues and challenges. Chapter 94. A comparative study of privacy protection practices in the US, Europe, and Asia ; Chapter 95. Survey on ddos attacks and defense mechanisms in cloud and fog computing ; Chapter 96. Multi-aspect DDOS detection system for securing cloud network ; Chapter 97. Session hijacking over cloud environment: a literature survey ; Chapter 98. Impact of big data on security: big data security issues and defense schemes ; Chapter 99. Investigating the determinants of IT professionals' intention to use cloud-based applications and solutions: an extension of the technology acceptance ; Chapter 100. Privacy preserving public auditing in cloud: literature review -- Section 8. Emerging trends. Chapter 101. Advances in information, security, privacy and ethics: use of cloud computing for education ; Chapter 102. On developing fair and orderly cloud markets: qos- and security-aware optimization of cloud collaboration ; Chapter 103. The much needed security and data reforms of cloud computing in medical data storage ; Chapter 104. Deployment and optimization for cloud computing technologies in IoT ; Chapter 105. Trust in an enterprise world: a survey ; Chapter 106. Challenges and opportunities in vehicular cloud computing ; Chapter 107. Future directions to the application of distributed fog computing in smart grid systems ; Chapter 108. Emerging cloud computing services: a brief opinion article.
506
$a
Restricted to subscribers or individual electronic text purchasers.
520
3
$a
"This book explores the difficulties and challenges of securing user data and information on cloud platforms. It also examines the current approaches to cloud-based technologies and assesses the possibilities for future advancements in this field. Highlighting a range of topics such as cloud forensics, information privacy, and standardization and security in the cloud"--Provided by publisher.
650
0
$a
Cloud computing
$x
Security measures.
$3
775821
710
2
$a
Information Resources Management Association.
$3
805473
856
4 0
$u
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8176-5
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入