Cloud Computing Security
Foundations and Challenges
Herausgeber: Vacca, John R
Cloud Computing Security
Foundations and Challenges
Herausgeber: Vacca, John R
- Broschiertes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Overview of cloud computing security technology and implementation. Explores practical solutions to a wide range of cloud computing security issues. Chapetrs by leading experts in the field address immediate and long-term challenges cloud computing security.
Andere Kunden interessierten sich auch für
- Bhavani ThuraisinghamDeveloping and Securing the Cloud82,99 €
- Walter WilliamsSecurity for Service Oriented Architectures89,99 €
- Osama S FaragallahMultilevel Security for Relational Databases83,99 €
- Pethuru RajCloud Enterprise Architecture77,99 €
- Jitendra KumarMachine Learning for Cloud Management83,99 €
- Biometrics in a Data Driven World66,99 €
- Iztok FajfarStart Programming Using Html, Css, and JavaScript137,99 €
-
-
-
Overview of cloud computing security technology and implementation. Explores practical solutions to a wide range of cloud computing security issues. Chapetrs by leading experts in the field address immediate and long-term challenges cloud computing security.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: CRC Press
- 2nd edition
- Seitenzahl: 522
- Erscheinungstermin: 9. November 2020
- Englisch
- Abmessung: 277mm x 215mm x 35mm
- Gewicht: 1436g
- ISBN-13: 9780367560331
- ISBN-10: 036756033X
- Artikelnr.: 60000327
- Herstellerkennzeichnung
- Libri GmbH
- Europaallee 1
- 36244 Bad Hersfeld
- gpsr@libri.de
- Verlag: CRC Press
- 2nd edition
- Seitenzahl: 522
- Erscheinungstermin: 9. November 2020
- Englisch
- Abmessung: 277mm x 215mm x 35mm
- Gewicht: 1436g
- ISBN-13: 9780367560331
- ISBN-10: 036756033X
- Artikelnr.: 60000327
- Herstellerkennzeichnung
- Libri GmbH
- Europaallee 1
- 36244 Bad Hersfeld
- gpsr@libri.de
John Vacca is an information technology consultant and internationally- known author of more than 600 articles in the areas of advanced storage, computer security and aerospace technology. John was also a conguration management specialist, computer specialist, and the computer security ofcial (CSO) for NASA's space station program (Freedom) and the International Space Station Program, from 1988 until his retirement from NASA in 1995.
Section I Introduction Chapter 1
Cloud Computing Essentials 3 Anna Squicciarini, Daniela Oliveira, and Dan Lin Chapter 2
An Overview of Cloud Computing 13 William Stallings Chapter 3
Cloud Security Baselines 31 Daniela Oliveira, Anna Squicciarini, and Dan Lin Chapter 4
Cloud Security, Privacy and Trust Baselines 45 Nikolaos Pitropakis, Sokratis Katsikas, and Costas Lambrinoudakis Chapter 5
Infrastructure as a Service (IaaS) 65 Mario Santana Section II Risk Analysis and Division of Responsibility Chapter 6
Risk and Trust As ess ment: Schemes for Cloud Services 73 Erdal Cayirci Chapter 7
Managing Risk in the Cloud 85 Michaela Iorga and Anil Karmel Chapter 8
Cloud Security Risk Management 95 Marco Cremonini Chapter 9
Secure Cloud Risk Management: Risk Mitigation Methods 115 Jim Harmening and Randall DeVitto Section III Securing the Cloud Infrastructure Chapter 10
Specification and Enforcement of Access Policies in Emerging Scenarios 129 Sabrina De Capitani di Vimercati, Sara Foresti, and Pierangela Samarati Chapter 11
Cryptographic Key Management for Data Protection 151 Sarbari Gupta Chapter 12
Cloud Security Access Control: Distributed Access Control 157 Jim Harmening and Randall DeVitto Chapter 13
Cloud Security Key Management: Cloud User Controls 167 Weiyu Jiang, Jingqiang Lin, Zhan Wang, Bo Chen, and Kun Sun Chapter 14
Cloud Computing Security Ess entials and Architecture 195 Michaela Iorga and Anil Karmel Chapter 15
Cloud Computing Architecture and Security Concepts 213 Pramod Pandya and Riad Rahmo Chapter 16
Secure Cloud Architecture 225 Pramod Pandya Section IV Operating System and Network Security Chapter 17
Locking Down Cloud Servers 237 Thorsten Herre Chapter 18
Third-Party Providers Integrity Assurance for Data Outsourcing 255 Jiawei Yuan and Shucheng Yu Section V Meeting Compliance Requirements Chapter 19
Negotiating Cloud Security Requirements with Vendors 271 Daniel S. Soper Chapter 20
Managing Legal Compliance in the Cloud: Understanding Contractual and Personal Data Protection Requirements 283 Paolo Balboni Chapter 21
Integrity Assurance for Data Outsourcing 299 Reza Curtmola and Bo Chen Chapter 22
Secure Computation Outsourcing 311 Shams Zawoad and Ragib Hasan Chapter 23
Computation Over Encrypted Data 329 Feng-Hao Liu Chapter 24
Trusted Computing Technology 347 Felipe E. Medina Chapter 25
Technology for Trusted Cloud Security: Survey and Open Issues 357 Roberto Di Pietro, Flavio Lombardi, and Matteo Signorini Chapter 26
Trusted Computing Technology and Proposals for Resolving Cloud Computing Security Problems 373 Ignazio Pedone, Daniele Canavese, and Antonio Lioy Chapter 27
Assuring Compliance with Government Certification and Accreditation Regulations 387 Sarbari Gupta Chapter 28
Government Certification, Accreditation, Regulations, and Compliance Risks 395 Thorsten Herre Section VI Preparing for Disaster Recovery Chapter 29
Simplifying Secure Cloud Computing Environments with Cloud Data Centers 411 Thorsten Herre Chapter 30
Availability, Recovery, and Auditing across Data Centers 425 Reza Curtmola and Bo Chen Section VII Advanced Cloud Computing Security Chapter 31
Advanced Security Architecture for Cloud Computing 443 Albert Caballero Chapter 32
Side-Channel Attacks and Defenses on Cloud Traffic 463 Wen Ming Liu and Lingyu Wang Chapter 33
Clouds Are Evil 477 John Strand Chapter 34
Future Directions in Cloud Computing Security: Risks and Challenges 489 Mohammad Kamrul Islam and Rasib Khan
Cloud Computing Essentials 3 Anna Squicciarini, Daniela Oliveira, and Dan Lin Chapter 2
An Overview of Cloud Computing 13 William Stallings Chapter 3
Cloud Security Baselines 31 Daniela Oliveira, Anna Squicciarini, and Dan Lin Chapter 4
Cloud Security, Privacy and Trust Baselines 45 Nikolaos Pitropakis, Sokratis Katsikas, and Costas Lambrinoudakis Chapter 5
Infrastructure as a Service (IaaS) 65 Mario Santana Section II Risk Analysis and Division of Responsibility Chapter 6
Risk and Trust As ess ment: Schemes for Cloud Services 73 Erdal Cayirci Chapter 7
Managing Risk in the Cloud 85 Michaela Iorga and Anil Karmel Chapter 8
Cloud Security Risk Management 95 Marco Cremonini Chapter 9
Secure Cloud Risk Management: Risk Mitigation Methods 115 Jim Harmening and Randall DeVitto Section III Securing the Cloud Infrastructure Chapter 10
Specification and Enforcement of Access Policies in Emerging Scenarios 129 Sabrina De Capitani di Vimercati, Sara Foresti, and Pierangela Samarati Chapter 11
Cryptographic Key Management for Data Protection 151 Sarbari Gupta Chapter 12
Cloud Security Access Control: Distributed Access Control 157 Jim Harmening and Randall DeVitto Chapter 13
Cloud Security Key Management: Cloud User Controls 167 Weiyu Jiang, Jingqiang Lin, Zhan Wang, Bo Chen, and Kun Sun Chapter 14
Cloud Computing Security Ess entials and Architecture 195 Michaela Iorga and Anil Karmel Chapter 15
Cloud Computing Architecture and Security Concepts 213 Pramod Pandya and Riad Rahmo Chapter 16
Secure Cloud Architecture 225 Pramod Pandya Section IV Operating System and Network Security Chapter 17
Locking Down Cloud Servers 237 Thorsten Herre Chapter 18
Third-Party Providers Integrity Assurance for Data Outsourcing 255 Jiawei Yuan and Shucheng Yu Section V Meeting Compliance Requirements Chapter 19
Negotiating Cloud Security Requirements with Vendors 271 Daniel S. Soper Chapter 20
Managing Legal Compliance in the Cloud: Understanding Contractual and Personal Data Protection Requirements 283 Paolo Balboni Chapter 21
Integrity Assurance for Data Outsourcing 299 Reza Curtmola and Bo Chen Chapter 22
Secure Computation Outsourcing 311 Shams Zawoad and Ragib Hasan Chapter 23
Computation Over Encrypted Data 329 Feng-Hao Liu Chapter 24
Trusted Computing Technology 347 Felipe E. Medina Chapter 25
Technology for Trusted Cloud Security: Survey and Open Issues 357 Roberto Di Pietro, Flavio Lombardi, and Matteo Signorini Chapter 26
Trusted Computing Technology and Proposals for Resolving Cloud Computing Security Problems 373 Ignazio Pedone, Daniele Canavese, and Antonio Lioy Chapter 27
Assuring Compliance with Government Certification and Accreditation Regulations 387 Sarbari Gupta Chapter 28
Government Certification, Accreditation, Regulations, and Compliance Risks 395 Thorsten Herre Section VI Preparing for Disaster Recovery Chapter 29
Simplifying Secure Cloud Computing Environments with Cloud Data Centers 411 Thorsten Herre Chapter 30
Availability, Recovery, and Auditing across Data Centers 425 Reza Curtmola and Bo Chen Section VII Advanced Cloud Computing Security Chapter 31
Advanced Security Architecture for Cloud Computing 443 Albert Caballero Chapter 32
Side-Channel Attacks and Defenses on Cloud Traffic 463 Wen Ming Liu and Lingyu Wang Chapter 33
Clouds Are Evil 477 John Strand Chapter 34
Future Directions in Cloud Computing Security: Risks and Challenges 489 Mohammad Kamrul Islam and Rasib Khan
Section I Introduction Chapter 1
Cloud Computing Essentials 3 Anna Squicciarini, Daniela Oliveira, and Dan Lin Chapter 2
An Overview of Cloud Computing 13 William Stallings Chapter 3
Cloud Security Baselines 31 Daniela Oliveira, Anna Squicciarini, and Dan Lin Chapter 4
Cloud Security, Privacy and Trust Baselines 45 Nikolaos Pitropakis, Sokratis Katsikas, and Costas Lambrinoudakis Chapter 5
Infrastructure as a Service (IaaS) 65 Mario Santana Section II Risk Analysis and Division of Responsibility Chapter 6
Risk and Trust As ess ment: Schemes for Cloud Services 73 Erdal Cayirci Chapter 7
Managing Risk in the Cloud 85 Michaela Iorga and Anil Karmel Chapter 8
Cloud Security Risk Management 95 Marco Cremonini Chapter 9
Secure Cloud Risk Management: Risk Mitigation Methods 115 Jim Harmening and Randall DeVitto Section III Securing the Cloud Infrastructure Chapter 10
Specification and Enforcement of Access Policies in Emerging Scenarios 129 Sabrina De Capitani di Vimercati, Sara Foresti, and Pierangela Samarati Chapter 11
Cryptographic Key Management for Data Protection 151 Sarbari Gupta Chapter 12
Cloud Security Access Control: Distributed Access Control 157 Jim Harmening and Randall DeVitto Chapter 13
Cloud Security Key Management: Cloud User Controls 167 Weiyu Jiang, Jingqiang Lin, Zhan Wang, Bo Chen, and Kun Sun Chapter 14
Cloud Computing Security Ess entials and Architecture 195 Michaela Iorga and Anil Karmel Chapter 15
Cloud Computing Architecture and Security Concepts 213 Pramod Pandya and Riad Rahmo Chapter 16
Secure Cloud Architecture 225 Pramod Pandya Section IV Operating System and Network Security Chapter 17
Locking Down Cloud Servers 237 Thorsten Herre Chapter 18
Third-Party Providers Integrity Assurance for Data Outsourcing 255 Jiawei Yuan and Shucheng Yu Section V Meeting Compliance Requirements Chapter 19
Negotiating Cloud Security Requirements with Vendors 271 Daniel S. Soper Chapter 20
Managing Legal Compliance in the Cloud: Understanding Contractual and Personal Data Protection Requirements 283 Paolo Balboni Chapter 21
Integrity Assurance for Data Outsourcing 299 Reza Curtmola and Bo Chen Chapter 22
Secure Computation Outsourcing 311 Shams Zawoad and Ragib Hasan Chapter 23
Computation Over Encrypted Data 329 Feng-Hao Liu Chapter 24
Trusted Computing Technology 347 Felipe E. Medina Chapter 25
Technology for Trusted Cloud Security: Survey and Open Issues 357 Roberto Di Pietro, Flavio Lombardi, and Matteo Signorini Chapter 26
Trusted Computing Technology and Proposals for Resolving Cloud Computing Security Problems 373 Ignazio Pedone, Daniele Canavese, and Antonio Lioy Chapter 27
Assuring Compliance with Government Certification and Accreditation Regulations 387 Sarbari Gupta Chapter 28
Government Certification, Accreditation, Regulations, and Compliance Risks 395 Thorsten Herre Section VI Preparing for Disaster Recovery Chapter 29
Simplifying Secure Cloud Computing Environments with Cloud Data Centers 411 Thorsten Herre Chapter 30
Availability, Recovery, and Auditing across Data Centers 425 Reza Curtmola and Bo Chen Section VII Advanced Cloud Computing Security Chapter 31
Advanced Security Architecture for Cloud Computing 443 Albert Caballero Chapter 32
Side-Channel Attacks and Defenses on Cloud Traffic 463 Wen Ming Liu and Lingyu Wang Chapter 33
Clouds Are Evil 477 John Strand Chapter 34
Future Directions in Cloud Computing Security: Risks and Challenges 489 Mohammad Kamrul Islam and Rasib Khan
Cloud Computing Essentials 3 Anna Squicciarini, Daniela Oliveira, and Dan Lin Chapter 2
An Overview of Cloud Computing 13 William Stallings Chapter 3
Cloud Security Baselines 31 Daniela Oliveira, Anna Squicciarini, and Dan Lin Chapter 4
Cloud Security, Privacy and Trust Baselines 45 Nikolaos Pitropakis, Sokratis Katsikas, and Costas Lambrinoudakis Chapter 5
Infrastructure as a Service (IaaS) 65 Mario Santana Section II Risk Analysis and Division of Responsibility Chapter 6
Risk and Trust As ess ment: Schemes for Cloud Services 73 Erdal Cayirci Chapter 7
Managing Risk in the Cloud 85 Michaela Iorga and Anil Karmel Chapter 8
Cloud Security Risk Management 95 Marco Cremonini Chapter 9
Secure Cloud Risk Management: Risk Mitigation Methods 115 Jim Harmening and Randall DeVitto Section III Securing the Cloud Infrastructure Chapter 10
Specification and Enforcement of Access Policies in Emerging Scenarios 129 Sabrina De Capitani di Vimercati, Sara Foresti, and Pierangela Samarati Chapter 11
Cryptographic Key Management for Data Protection 151 Sarbari Gupta Chapter 12
Cloud Security Access Control: Distributed Access Control 157 Jim Harmening and Randall DeVitto Chapter 13
Cloud Security Key Management: Cloud User Controls 167 Weiyu Jiang, Jingqiang Lin, Zhan Wang, Bo Chen, and Kun Sun Chapter 14
Cloud Computing Security Ess entials and Architecture 195 Michaela Iorga and Anil Karmel Chapter 15
Cloud Computing Architecture and Security Concepts 213 Pramod Pandya and Riad Rahmo Chapter 16
Secure Cloud Architecture 225 Pramod Pandya Section IV Operating System and Network Security Chapter 17
Locking Down Cloud Servers 237 Thorsten Herre Chapter 18
Third-Party Providers Integrity Assurance for Data Outsourcing 255 Jiawei Yuan and Shucheng Yu Section V Meeting Compliance Requirements Chapter 19
Negotiating Cloud Security Requirements with Vendors 271 Daniel S. Soper Chapter 20
Managing Legal Compliance in the Cloud: Understanding Contractual and Personal Data Protection Requirements 283 Paolo Balboni Chapter 21
Integrity Assurance for Data Outsourcing 299 Reza Curtmola and Bo Chen Chapter 22
Secure Computation Outsourcing 311 Shams Zawoad and Ragib Hasan Chapter 23
Computation Over Encrypted Data 329 Feng-Hao Liu Chapter 24
Trusted Computing Technology 347 Felipe E. Medina Chapter 25
Technology for Trusted Cloud Security: Survey and Open Issues 357 Roberto Di Pietro, Flavio Lombardi, and Matteo Signorini Chapter 26
Trusted Computing Technology and Proposals for Resolving Cloud Computing Security Problems 373 Ignazio Pedone, Daniele Canavese, and Antonio Lioy Chapter 27
Assuring Compliance with Government Certification and Accreditation Regulations 387 Sarbari Gupta Chapter 28
Government Certification, Accreditation, Regulations, and Compliance Risks 395 Thorsten Herre Section VI Preparing for Disaster Recovery Chapter 29
Simplifying Secure Cloud Computing Environments with Cloud Data Centers 411 Thorsten Herre Chapter 30
Availability, Recovery, and Auditing across Data Centers 425 Reza Curtmola and Bo Chen Section VII Advanced Cloud Computing Security Chapter 31
Advanced Security Architecture for Cloud Computing 443 Albert Caballero Chapter 32
Side-Channel Attacks and Defenses on Cloud Traffic 463 Wen Ming Liu and Lingyu Wang Chapter 33
Clouds Are Evil 477 John Strand Chapter 34
Future Directions in Cloud Computing Security: Risks and Challenges 489 Mohammad Kamrul Islam and Rasib Khan