Cloud security[electronic resource] ...
Information Resources Management Association.

 

  • Cloud security[electronic resource] :concepts, methodologies, tools, and applications /
  • レコード種別: コンピュータ・メディア : 単行資料
    [NT 15000414] null: 004.67/82
    タイトル / 著者: Cloud security : concepts, methodologies, tools, and applications // Information Resources Management Association, editor.
    出版された: Hershey, Pennsylvania : : IGI Global,, [2019]
    記述: 1 online resource (4 v.)
    主題: Cloud computing - Security measures.
    国際標準図書番号 (ISBN) : 9781522581772 (e-book)
    国際標準図書番号 (ISBN) : 9781522581765 (hardback)
    [NT 15000227] null: Includes bibliographical references and index.
    [NT 15000228] null: Volume I. Section 1. Fundamental concepts and theories. Chapter 1. Curtailing the threats to cloud computing in the fourth industrial revolution ; Chapter 2. Role of security mechanisms in the building blocks of the cloud infrastructure ; Chapter 3. A review of intrusion detection systems in cloud computing ; Chapter 4. Cloud-based platforms and infrastructures: provisioning physical and virtual networks ; Chapter 5. A comprehensive survey on trust issue and its deployed models in computing environment ; Chapter 6. Anomaly detection in cloud environments ; Chapter 7. Cloud database security issues and challenges ; Chapter 8. Approaches to cloud computing in the public sector: case studies in UK local government -- Section 2. Development and design methodologies. Chapter 9. A multi-dimensional mean failure cost model to enhance security of cloud computing systems ; Chapter 10. Enterprise security framework for enterprise cloud data centres ; Chapter 11. A security framework for secure cloud computing environments ; Chapter 12. Information security innovation: personalisation of security services in a mobile cloud infrastructure ; Chapter 13. Intelligent techniques for providing effective security to cloud databases ; Chapter 14. A TPM-based secure multi-cloud storage architecture grounded on erasure codes ; Chapter 15. Modeling the ranking of evaluation criteria for cloud services: the government organization perspective in India ; Chapter 16. A framework to secure medical image storage in cloud computing environment ; Chapter 17. A security-by-distribution approach to manage big data in a federation of untrustworthy clouds ; Chapter 18. Enhanced trust path between two entities in cloud computing environment ; Chapter 19. Architectural design of trusted platform for IaaS cloud computing ; Chapter 20. An adaptive enterprise architecture framework and implementation: towards global enterprises in the era of cloud/mobile IT/digital IT ; Chapter 21. An authentication technique for accessing de-duplicated data from private cloud using one time password ; Chapter 22. A comprehensive survey on techniques based on TPM for ensuring the confidentiality in cloud data centers ; Chapter 23. Strategic planning for cloud computing adoption in STEM education: finding best practice solutions ; Chapter 24. The dynamic data privacy protection strategy based on the CAP theory ; Chapter 25. A novel multi-secret sharing approach for secure data warehousing and on-Line analysis processing in the cloud ; Chapter 26. A secured real time scheduling model for cloud hypervisor -- Section 3. Tools and technologies. Chapter 27. CCCE: cryptographic cloud computing environment based on quantum computations -- Volume II. Chapter 28. Role of agents to enhance the security and scalability in cloud environment ; Chapter 29. Runtime reusable weaving model for cloud services using aspect-oriented programming: the security-related aspect ; Chapter 30. Security in ad hoc network and computing paradigms ; Chapter 31. A proactive approach to intrusion detection in cloud software as a service ; Chapter 32. Cryptography in big data security ; Chapter 33. Glorified secure search schema over encrypted secure cloud storage with a hierarchical clustering computation ; Chapter 34. Classification of file data based on confidentiality in cloud computing using K-NN classifier ; Chapter 35. Access control framework for cloud computing ; Chapter 36. Cloud computing data storage security based on different encryption schemes ; Chapter 37. Healthcare saas based on a data model with built-in security and privacy ; Chapter 38. Security model for mobile cloud database as a service (DBaaS) ; Chapter 39. Securely communicating with an optimal cloud for intelligently enhancing a cloud's elasticity ; Chapter 40. Semantic electronic commerce architecture and models in cloud ; Chapter 41. Better security and encryption within cloud computing systems ; Chapter 42. Analyzing virtualization vulnerabilities and design a secure cloud environment to prevent from XSS attack ; Chapter 43. Cloud and cyber security through Crypt-Iris-based authentication approach ; Chapter 44. Trusted cloud- and femtocell-based biometric authentication for mobile networks ; Chapter 45. Modelling of cloud computing enablers using MICMAC analysis and TISM ; Chapter 46. Byzantine fault-tolerant architecture in cloud data management ; Chapter 47. A credible cloud service model based on behavior graphs and tripartite decision-making mechanism ; Chapter 48. Keystroke dynamics authentication in cloud computing: a survey -- Section 4. Utilization and applications. Chapter 49. Cloud computing and cybersecurity issues facing local enterprises ; Chapter 50. Data security and privacy assurance considerations in cloud computing for health insurance providers ; Chapter 51. Identification of various privacy and trust issues in cloud computing environment ; Chapter 52. Cryptographic cloud computing environment as a more trusted communication environment ; Chapter 53. Solutions for securing end user data over the cloud deployed applications ; Chapter 54. KIET framework for cloud adoption: Indian banking case study ; Chapter 55. Vehicular cloud computing challenges and security ; Chapter 56. A randomized cloud library security environment -- Volume III. Chapter 57. Secure mobile multi cloud architecture for authentication and data storage ; Chapter 58. Data storage security service in cloud computing: challenges and solutions ; Chapter 59. Digital forensics in distributed environment ; Chapter 60. Cloud auditor loyalty checking process using dual signature ; Chapter 61. Security in cloud of things (CoT) ; Chapter 62. Data security in wired and wireless systems ; Chapter 63. Cloud computing applications in the public sector ; Chapter 64. Data integrity in mobile cloud computing ; Chapter 65. Cloud security using 2-factor image authentication technique ; Chapter 66. Challenges of cloud computing adoption from the TOE framework perspective ; Chapter 67. The benefits of cloud computing: evidence from Greece ; Chapter 68. Mobile cloud gaming and today's world ; Chapter 69. Awareness of sustainability, green IT, and cloud computing in Indian organisations ; Chapter 70. A cloud-based architecture for interactive e-training ; Chapter 71. Necessity of key aggregation cryptosystem for data sharing in cloud computing -- Section 5. Organizational and social implications. Chapter 72. Impact of technology innovation: a study on cloud risk mitigation ; Chapter 73. A review of security challenges in cloud storage of big data ; Chapter 74. Why we disclose personal information despite cybersecurity risks and vulnerabilities: obligatory passage point perspective ; Chapter 75. Trust, privacy, issues in cloud-based healthcare services ; Chapter 76. The role of service recovery in online privacy violation ; Chapter 77. A cloud based solution for collaborative and secure sharing of medical data ; Chapter 78. Trust relationship establishment among multiple cloud service provider ; Chapter 79. The attitudes of Chinese organizations towards cloud computing: an exploratory study ; Chapter 80. Security and privacy issues of big data ; Chapter 81. SOHO users' perceptions of reliability and continuity of cloud-based services -- Volume IV. Chapter 82. Examining the contributing factors for cloud computing adoption in a developing country ; Chapter 83. Trust management in cloud computing -- Section 6. Managerial impact. Chapter 84. The collaborative use of patients' health-related information: challenges and research problems in a networked world ; Chapter 85. Cloud computing in the 21st century: a managerial perspective for policies and practices ; Chapter 86. Security risks of biomedical data processing in cloud computing environment ; Chapter 87. Meeting compliance requirements while using cloud services ; Chapter 88.
    [NT 15000229] null: "This book explores the difficulties and challenges of securing user data and information on cloud platforms. It also examines the current approaches to cloud-based technologies and assesses the possibilities for future advancements in this field. Highlighting a range of topics such as cloud forensics, information privacy, and standardization and security in the cloud"--Provided by publisher.
    電子資源: http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8176-5
マルチメディア (複合媒体資料)
論評
Export
受取館
 
 
パスワードを変更する
ログイン