Language:
English
日文
簡体中文
繁體中文
Help
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Modern principles, practices, and al...
~
Gupta, Brij, (1982-)
Modern principles, practices, and algorithms for cloud security[electronic resource] /
Record Type:
Electronic resources : Monograph/item
[NT 15000414]:
004.67/82
Title/Author:
Modern principles, practices, and algorithms for cloud security/ edited by Brij B. Gupta.
other author:
Gupta, Brij,
Published:
Hershey, Pennsylvania : : IGI Global,, 2019.
Description:
1 online resource (xvii, 344 p.)
Subject:
Cloud computing - Security measures.
ISBN:
9781799810841 (ebk.)
ISBN:
9781799810827 (hbk.)
ISBN:
9781799810834 (pbk.)
[NT 15000227]:
Includes bibliographical references and index.
[NT 15000228]:
Chapter 1. Security- and privacy-aware computing in cloud with user mobility: an extensive review -- Chapter 2. Recent advances delivered in mobile cloud computing's security and management challenges -- Chapter 3. Security for cross-tenant access control in cloud computing -- Chapter 4. Secure identity-based proxy signature with computational diffie-Hellman for cloud data management -- Chapter 5. Cloud computing adoption: a scale development approach -- Chapter 6. A computational approach for secure cloud computing environments -- Chapter 7. Security threats and recent countermeasures in cloud computing -- Chapter 8. A framework strategy to overcome trust issues on cloud computing adoption in higher education -- Chapter 9. A proposal of improvement for transmission channels in cloud environments using the CBEDE methodology -- Chapter 10. Meta-heuristic and non-meta-heuristic energy-efficient load balancing algorithms in cloud computing -- Chapter 11. Distributed algorithms for finding meta-paths of a large heterogeneous information network on cloud -- Chapter 12. A tree computing block chain protocol crypto-signature model -- Chapter 13. Automate model transformation from CIM to PIM up to PSM in model-driven architecture.
[NT 15000229]:
"This book examines the principles, algorithms, applications, and practices of security in cloud computing"--
Online resource:
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-1082-7
Modern principles, practices, and algorithms for cloud security[electronic resource] /
Modern principles, practices, and algorithms for cloud security
[electronic resource] /edited by Brij B. Gupta. - Hershey, Pennsylvania :IGI Global,2019. - 1 online resource (xvii, 344 p.)
Includes bibliographical references and index.
Chapter 1. Security- and privacy-aware computing in cloud with user mobility: an extensive review -- Chapter 2. Recent advances delivered in mobile cloud computing's security and management challenges -- Chapter 3. Security for cross-tenant access control in cloud computing -- Chapter 4. Secure identity-based proxy signature with computational diffie-Hellman for cloud data management -- Chapter 5. Cloud computing adoption: a scale development approach -- Chapter 6. A computational approach for secure cloud computing environments -- Chapter 7. Security threats and recent countermeasures in cloud computing -- Chapter 8. A framework strategy to overcome trust issues on cloud computing adoption in higher education -- Chapter 9. A proposal of improvement for transmission channels in cloud environments using the CBEDE methodology -- Chapter 10. Meta-heuristic and non-meta-heuristic energy-efficient load balancing algorithms in cloud computing -- Chapter 11. Distributed algorithms for finding meta-paths of a large heterogeneous information network on cloud -- Chapter 12. A tree computing block chain protocol crypto-signature model -- Chapter 13. Automate model transformation from CIM to PIM up to PSM in model-driven architecture.
Restricted to subscribers or individual electronic text purchasers.
"This book examines the principles, algorithms, applications, and practices of security in cloud computing"--
ISBN: 9781799810841 (ebk.)Subjects--Topical Terms:
412456
Cloud computing
--Security measures.
LC Class. No.: QA76.585 / .M6434 2019e
Dewey Class. No.: 004.67/82
Modern principles, practices, and algorithms for cloud security[electronic resource] /
LDR
:02355nmm a2200277 a 4500
001
516101
003
IGIG
005
20201224101415.0
006
m o d
007
cr cn
008
220422s2019 pau fob 001 0 eng d
020
$a
9781799810841 (ebk.)
020
$a
9781799810827 (hbk.)
020
$a
9781799810834 (pbk.)
035
$a
(OCoLC)1122549004
035
$a
1091218064
040
$a
CaBNVSL
$b
eng
$c
CaBNVSL
$d
CaBNVSL
050
0 0
$a
QA76.585
$b
.M6434 2019e
082
0 0
$a
004.67/82
$2
23
245
0 0
$a
Modern principles, practices, and algorithms for cloud security
$h
[electronic resource] /
$c
edited by Brij B. Gupta.
260
$a
Hershey, Pennsylvania :
$b
IGI Global,
$c
2019.
300
$a
1 online resource (xvii, 344 p.)
504
$a
Includes bibliographical references and index.
505
0
$a
Chapter 1. Security- and privacy-aware computing in cloud with user mobility: an extensive review -- Chapter 2. Recent advances delivered in mobile cloud computing's security and management challenges -- Chapter 3. Security for cross-tenant access control in cloud computing -- Chapter 4. Secure identity-based proxy signature with computational diffie-Hellman for cloud data management -- Chapter 5. Cloud computing adoption: a scale development approach -- Chapter 6. A computational approach for secure cloud computing environments -- Chapter 7. Security threats and recent countermeasures in cloud computing -- Chapter 8. A framework strategy to overcome trust issues on cloud computing adoption in higher education -- Chapter 9. A proposal of improvement for transmission channels in cloud environments using the CBEDE methodology -- Chapter 10. Meta-heuristic and non-meta-heuristic energy-efficient load balancing algorithms in cloud computing -- Chapter 11. Distributed algorithms for finding meta-paths of a large heterogeneous information network on cloud -- Chapter 12. A tree computing block chain protocol crypto-signature model -- Chapter 13. Automate model transformation from CIM to PIM up to PSM in model-driven architecture.
506
$a
Restricted to subscribers or individual electronic text purchasers.
520
3
$a
"This book examines the principles, algorithms, applications, and practices of security in cloud computing"--
$c
Provided by publisher.
650
0
$a
Cloud computing
$x
Security measures.
$3
412456
700
1
$a
Gupta, Brij,
$d
1982-
$e
editor.
$3
690522
856
4 0
$u
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-1082-7
based on 0 review(s)
Multimedia
Multimedia file
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-1082-7
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login