Security, Privacy and Trust in Cloud Systems:
Gespeichert in:
Weitere beteiligte Personen: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Berlin [u.a.]
Springer
2014
|
Schlagwörter: | |
Links: | https://doi.org/10.1007/978-3-642-38586-5 https://doi.org/10.1007/978-3-642-38586-5 https://doi.org/10.1007/978-3-642-38586-5 https://doi.org/10.1007/978-3-642-38586-5 https://doi.org/10.1007/978-3-642-38586-5 https://doi.org/10.1007/978-3-642-38586-5 https://doi.org/10.1007/978-3-642-38586-5 https://doi.org/10.1007/978-3-642-38586-5 https://doi.org/10.1007/978-3-642-38586-5 https://doi.org/10.1007/978-3-642-38586-5 https://doi.org/10.1007/978-3-642-38586-5 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026917172&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026917172&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
Beschreibung: | The book compiles technologies for enhancing and provisioning security, privacy and trust in cloud systems based on Quality of Servise requirements. It is a timely contribution to a field that is gaining considerable research interest, momentum, and provides a comprehensive coverage of technologies related to cloud security, privacy and trust. In particular, the book includes - Cloud security fundamentals and related technologies to-date, with a comprehensive coverage of evolution, current landscape, and future roadmap. - A smooth organization with introductory, advanced and specialist content, i.e. from basics of security, privacy and trust in cloud systems, to advanced cartographic techniques, case studies covering both social and technological aspects, and advanced platforms. - Case studies written by professionals and/or industrial researchers. - Inclusion of a section on Cloud security and eGovernance tutorial that can be used for knowledge transfer and teaching purpose. - Identification of open research issues to help practitioners and researchers. The book is a timely topic for readers, including practicing engineers and academics, in the domains related to the engineering, science, and art of building networks and networked applications. Specifically, upon reading this book, audiences will perceive the following benefits: 1. Learn the state-of-the-art in research and development on cloud security, privacy and trust. 2. Obtain a future roadmap by learning open research issues. 3. Gather the background knowledge to tackle key problems, whose solutions will enhance the evolution of next-generation secure cloud systems |
Umfang: | 1 Online-Ressource (XX, 459 S.) Ill., graph. Darst. |
ISBN: | 9783642385865 |
DOI: | 10.1007/978-3-642-38586-5 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV041471030 | ||
003 | DE-604 | ||
005 | 20220308 | ||
007 | cr|uuu---uuuuu | ||
008 | 131210s2014 gw ad|| o|||| 00||| eng d | ||
020 | |a 9783642385865 |9 978-3-642-38586-5 | ||
024 | 7 | |a 10.1007/978-3-642-38586-5 |2 doi | |
035 | |a (OCoLC)862984674 | ||
035 | |a (DE-599)BVBBV041471030 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
044 | |a gw |c XA-DE-BE | ||
049 | |a DE-Aug4 |a DE-92 |a DE-634 |a DE-859 |a DE-898 |a DE-573 |a DE-861 |a DE-706 |a DE-188 |a DE-863 |a DE-862 | ||
082 | 0 | |a 621.382 |2 23 | |
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
245 | 1 | 0 | |a Security, Privacy and Trust in Cloud Systems |c edited by Surya Nepal, Mukaddim Pathan |
264 | 1 | |a Berlin [u.a.] |b Springer |c 2014 | |
300 | |a 1 Online-Ressource (XX, 459 S.) |b Ill., graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a The book compiles technologies for enhancing and provisioning security, privacy and trust in cloud systems based on Quality of Servise requirements. It is a timely contribution to a field that is gaining considerable research interest, momentum, and provides a comprehensive coverage of technologies related to cloud security, privacy and trust. In particular, the book includes - Cloud security fundamentals and related technologies to-date, with a comprehensive coverage of evolution, current landscape, and future roadmap. - A smooth organization with introductory, advanced and specialist content, i.e. from basics of security, privacy and trust in cloud systems, to advanced cartographic techniques, case studies covering both social and technological aspects, and advanced platforms. - Case studies written by professionals and/or industrial researchers. - Inclusion of a section on Cloud security and eGovernance tutorial that can be used for knowledge transfer and teaching purpose. - Identification of open research issues to help practitioners and researchers. The book is a timely topic for readers, including practicing engineers and academics, in the domains related to the engineering, science, and art of building networks and networked applications. Specifically, upon reading this book, audiences will perceive the following benefits: 1. Learn the state-of-the-art in research and development on cloud security, privacy and trust. 2. Obtain a future roadmap by learning open research issues. 3. Gather the background knowledge to tackle key problems, whose solutions will enhance the evolution of next-generation secure cloud systems | ||
505 | 0 | |a Part I Cloud Computing Fundamentals -- Introduction to cloud computing -- Secure information sharing and data protection in the cloud -- Intra and inter-cloud security, privacy and trust -- Cloud-based eGovernance -- Part II Cloud Security -- Cloud security architecture and protocol -- Secure cloud data management service -- Security and virtualization -- Autonomic security in cloud systems -- Part III Cloud Privacy -- Cryptography and crypto-protocols for cloud systems -- Access control mechanisms -- Risk management in the cloud -- Privacy protection policies in cloud platforms and operations -- Part IV Cloud Trust -- Trust models for cloud services -- QoS-based trust model and QoS monitoring mechanism -- Cloud compliance -- Non-repudiation and reputation in the cloud -- Part V Case Studies -- Secure cloud platforms and applications -- Enterprise cloud security case study -- Open research issues in cloud security and future roadmap -- Cloud and eGovernment tutorial: Challenges, solutions and experiences | |
650 | 4 | |a Engineering | |
650 | 4 | |a Data protection | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 4 | |a Telecommunication | |
650 | 4 | |a Communications Engineering, Networks | |
650 | 4 | |a Systems and Data Security | |
650 | 4 | |a Data Encryption | |
650 | 4 | |a Ingenieurwissenschaften | |
650 | 0 | 7 | |a Cloud Computing |0 (DE-588)7623494-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Dienstgüte |0 (DE-588)4496068-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Privatsphäre |0 (DE-588)4123980-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Trusted Computing |0 (DE-588)7562931-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Zugriffskontrolle |0 (DE-588)4293034-0 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)4143413-4 |a Aufsatzsammlung |2 gnd-content | |
689 | 0 | 0 | |a Cloud Computing |0 (DE-588)7623494-0 |D s |
689 | 0 | 1 | |a Trusted Computing |0 (DE-588)7562931-8 |D s |
689 | 0 | 2 | |a Privatsphäre |0 (DE-588)4123980-5 |D s |
689 | 0 | 3 | |a Dienstgüte |0 (DE-588)4496068-2 |D s |
689 | 0 | 4 | |a Zugriffskontrolle |0 (DE-588)4293034-0 |D s |
689 | 0 | 5 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
700 | 1 | |a Nepal, Surya |d 1970- |0 (DE-588)1046355864 |4 edt | |
700 | 1 | |a Pathan, Mukaddim |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-3-642-38585-8 |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-642-38586-5 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026917172&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026917172&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
912 | |a ZDB-2-ENG | ||
912 | |a ZDB-38-EBR | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-026917172 | |
966 | e | |u https://doi.org/10.1007/978-3-642-38586-5 |l DE-634 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-642-38586-5 |l DE-Aug4 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-642-38586-5 |l DE-573 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-642-38586-5 |l DE-92 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-642-38586-5 |l DE-898 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-642-38586-5 |l DE-859 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-642-38586-5 |l DE-861 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-642-38586-5 |l DE-706 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-642-38586-5 |l DE-863 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-642-38586-5 |l DE-862 |p ZDB-2-ENG |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1819248993116356608 |
---|---|
adam_text | SECURITY, PRIVACY AND TRUST IN CLOUD SYSTEMS
/
: 2014
TABLE OF CONTENTS / INHALTSVERZEICHNIS
PART I CLOUD COMPUTING FUNDAMENTALS
INTRODUCTION TO CLOUD COMPUTING
SECURE INFORMATION SHARING AND DATA PROTECTION IN THE CLOUD
INTRA AND INTER-CLOUD SECURITY, PRIVACY AND TRUST
CLOUD-BASED EGOVERNANCE
PART II CLOUD SECURITY
CLOUD SECURITY ARCHITECTURE AND PROTOCOL
SECURE CLOUD DATA MANAGEMENT SERVICE
SECURITY AND VIRTUALIZATION
AUTONOMIC SECURITY IN CLOUD SYSTEMS
PART III CLOUD PRIVACY
CRYPTOGRAPHY AND CRYPTO-PROTOCOLS FOR CLOUD SYSTEMS
ACCESS CONTROL MECHANISMS
RISK MANAGEMENT IN THE CLOUD
PRIVACY PROTECTION POLICIES IN CLOUD PLATFORMS AND OPERATIONS
PART IV CLOUD TRUST
TRUST MODELS FOR CLOUD SERVICES
QOS-BASED TRUST MODEL AND QOS MONITORING MECHANISM
CLOUD COMPLIANCE
NON-REPUDIATION AND REPUTATION IN THE CLOUD
PART V CASE STUDIES
SECURE CLOUD PLATFORMS AND APPLICATIONS
ENTERPRISE CLOUD SECURITY CASE STUDY
OPEN RESEARCH ISSUES IN CLOUD SECURITY AND FUTURE ROADMAP
CLOUD AND EGOVERNMENT TUTORIAL: CHALLENGES, SOLUTIONS AND EXPERIENCES
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
SECURITY, PRIVACY AND TRUST IN CLOUD SYSTEMS
/
: 2014
ABSTRACT / INHALTSTEXT
THE BOOK COMPILES TECHNOLOGIES FOR ENHANCING AND PROVISIONING SECURITY,
PRIVACY AND TRUST IN CLOUD SYSTEMS BASED ON QUALITY OF SERVISE
REQUIREMENTS. IT IS A TIMELY CONTRIBUTION TO A FIELD THAT IS GAINING
CONSIDERABLE RESEARCH INTEREST, MOMENTUM, AND PROVIDES A COMPREHENSIVE
COVERAGE OF TECHNOLOGIES RELATED TO CLOUD SECURITY, PRIVACY AND TRUST.
IN PARTICULAR, THE BOOK INCLUDES - CLOUD SECURITY FUNDAMENTALS AND
RELATED TECHNOLOGIES TO-DATE, WITH A COMPREHENSIVE COVERAGE OF
EVOLUTION, CURRENT LANDSCAPE, AND FUTURE ROADMAP. - A SMOOTH
ORGANIZATION WITH INTRODUCTORY, ADVANCED AND SPECIALIST CONTENT, I.E.
FROM BASICS OF SECURITY, PRIVACY AND TRUST IN CLOUD SYSTEMS, TO ADVANCED
CARTOGRAPHIC TECHNIQUES, CASE STUDIES COVERING BOTH SOCIAL AND
TECHNOLOGICAL ASPECTS, AND ADVANCED PLATFORMS. - CASE STUDIES WRITTEN BY
PROFESSIONALS AND/OR INDUSTRIAL RESEARCHERS. - INCLUSION OF A SECTION ON
CLOUD SECURITY AND EGOVERNANCE TUTORIAL THAT CAN BE USED FOR KNOWLEDGE
TRANSFER AND TEACHING PURPOSE. - IDENTIFICATION OF OPEN RESEARCH ISSUES
TO HELP PRACTITIONERS AND RESEARCHERS. THE BOOK IS A TIMELY TOPIC FOR
READERS, INCLUDING PRACTICING ENGINEERS AND ACADEMICS, IN THE DOMAINS
RELATED TO THE ENGINEERING, SCIENCE, AND ART OF BUILDING NETWORKS AND
NETWORKED APPLICATIONS. SPECIFICALLY, UPON READING THIS BOOK, AUDIENCES
WILL PERCEIVE THE FOLLOWING BENEFITS: 1. LEARN THE STATE-OF-THE-ART IN
RESEARCH AND DEVELOPMENT ON CLOUD SECURITY, PRIVACY AND TRUST. 2. OBTAIN
A FUTURE ROADMAP BY LEARNING OPEN RESEARCH ISSUES. 3. GATHER THE
BACKGROUND KNOWLEDGE TO TACKLE KEY PROBLEMS, WHOSE SOLUTIONS WILL
ENHANCE THE EVOLUTION OF NEXT-GENERATION SECURE CLOUD SYSTEMS
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
|
any_adam_object | 1 |
author2 | Nepal, Surya 1970- |
author2_role | edt |
author2_variant | s n sn |
author_GND | (DE-588)1046355864 |
author_facet | Nepal, Surya 1970- |
building | Verbundindex |
bvnumber | BV041471030 |
classification_rvk | ST 277 |
collection | ZDB-2-ENG ZDB-38-EBR |
contents | Part I Cloud Computing Fundamentals -- Introduction to cloud computing -- Secure information sharing and data protection in the cloud -- Intra and inter-cloud security, privacy and trust -- Cloud-based eGovernance -- Part II Cloud Security -- Cloud security architecture and protocol -- Secure cloud data management service -- Security and virtualization -- Autonomic security in cloud systems -- Part III Cloud Privacy -- Cryptography and crypto-protocols for cloud systems -- Access control mechanisms -- Risk management in the cloud -- Privacy protection policies in cloud platforms and operations -- Part IV Cloud Trust -- Trust models for cloud services -- QoS-based trust model and QoS monitoring mechanism -- Cloud compliance -- Non-repudiation and reputation in the cloud -- Part V Case Studies -- Secure cloud platforms and applications -- Enterprise cloud security case study -- Open research issues in cloud security and future roadmap -- Cloud and eGovernment tutorial: Challenges, solutions and experiences |
ctrlnum | (OCoLC)862984674 (DE-599)BVBBV041471030 |
dewey-full | 621.382 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 621 - Applied physics |
dewey-raw | 621.382 |
dewey-search | 621.382 |
dewey-sort | 3621.382 |
dewey-tens | 620 - Engineering and allied operations |
discipline | Informatik Elektrotechnik / Elektronik / Nachrichtentechnik |
doi_str_mv | 10.1007/978-3-642-38586-5 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>06656nam a2200805zc 4500</leader><controlfield tag="001">BV041471030</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20220308 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">131210s2014 gw ad|| o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642385865</subfield><subfield code="9">978-3-642-38586-5</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-642-38586-5</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)862984674</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV041471030</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">XA-DE-BE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-188</subfield><subfield code="a">DE-863</subfield><subfield code="a">DE-862</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">621.382</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security, Privacy and Trust in Cloud Systems</subfield><subfield code="c">edited by Surya Nepal, Mukaddim Pathan</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XX, 459 S.)</subfield><subfield code="b">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">The book compiles technologies for enhancing and provisioning security, privacy and trust in cloud systems based on Quality of Servise requirements. It is a timely contribution to a field that is gaining considerable research interest, momentum, and provides a comprehensive coverage of technologies related to cloud security, privacy and trust. In particular, the book includes - Cloud security fundamentals and related technologies to-date, with a comprehensive coverage of evolution, current landscape, and future roadmap. - A smooth organization with introductory, advanced and specialist content, i.e. from basics of security, privacy and trust in cloud systems, to advanced cartographic techniques, case studies covering both social and technological aspects, and advanced platforms. - Case studies written by professionals and/or industrial researchers. - Inclusion of a section on Cloud security and eGovernance tutorial that can be used for knowledge transfer and teaching purpose. - Identification of open research issues to help practitioners and researchers. The book is a timely topic for readers, including practicing engineers and academics, in the domains related to the engineering, science, and art of building networks and networked applications. Specifically, upon reading this book, audiences will perceive the following benefits: 1. Learn the state-of-the-art in research and development on cloud security, privacy and trust. 2. Obtain a future roadmap by learning open research issues. 3. Gather the background knowledge to tackle key problems, whose solutions will enhance the evolution of next-generation secure cloud systems</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Part I Cloud Computing Fundamentals -- Introduction to cloud computing -- Secure information sharing and data protection in the cloud -- Intra and inter-cloud security, privacy and trust -- Cloud-based eGovernance -- Part II Cloud Security -- Cloud security architecture and protocol -- Secure cloud data management service -- Security and virtualization -- Autonomic security in cloud systems -- Part III Cloud Privacy -- Cryptography and crypto-protocols for cloud systems -- Access control mechanisms -- Risk management in the cloud -- Privacy protection policies in cloud platforms and operations -- Part IV Cloud Trust -- Trust models for cloud services -- QoS-based trust model and QoS monitoring mechanism -- Cloud compliance -- Non-repudiation and reputation in the cloud -- Part V Case Studies -- Secure cloud platforms and applications -- Enterprise cloud security case study -- Open research issues in cloud security and future roadmap -- Cloud and eGovernment tutorial: Challenges, solutions and experiences</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Engineering</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Telecommunication</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Communications Engineering, Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data Encryption</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Ingenieurwissenschaften</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Cloud Computing</subfield><subfield code="0">(DE-588)7623494-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Dienstgüte</subfield><subfield code="0">(DE-588)4496068-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Trusted Computing</subfield><subfield code="0">(DE-588)7562931-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4143413-4</subfield><subfield code="a">Aufsatzsammlung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Cloud Computing</subfield><subfield code="0">(DE-588)7623494-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Trusted Computing</subfield><subfield code="0">(DE-588)7562931-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Dienstgüte</subfield><subfield code="0">(DE-588)4496068-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="5"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Nepal, Surya</subfield><subfield code="d">1970-</subfield><subfield code="0">(DE-588)1046355864</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Pathan, Mukaddim</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-3-642-38585-8</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-642-38586-5</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026917172&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026917172&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-ENG</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-38-EBR</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-026917172</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-642-38586-5</subfield><subfield code="l">DE-634</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-642-38586-5</subfield><subfield code="l">DE-Aug4</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-642-38586-5</subfield><subfield code="l">DE-573</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-642-38586-5</subfield><subfield code="l">DE-92</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-642-38586-5</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-642-38586-5</subfield><subfield code="l">DE-859</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-642-38586-5</subfield><subfield code="l">DE-861</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-642-38586-5</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-642-38586-5</subfield><subfield code="l">DE-863</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-642-38586-5</subfield><subfield code="l">DE-862</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | (DE-588)4143413-4 Aufsatzsammlung gnd-content |
genre_facet | Aufsatzsammlung |
id | DE-604.BV041471030 |
illustrated | Illustrated |
indexdate | 2024-12-20T16:48:08Z |
institution | BVB |
isbn | 9783642385865 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-026917172 |
oclc_num | 862984674 |
open_access_boolean | |
owner | DE-Aug4 DE-92 DE-634 DE-859 DE-898 DE-BY-UBR DE-573 DE-861 DE-706 DE-188 DE-863 DE-BY-FWS DE-862 DE-BY-FWS |
owner_facet | DE-Aug4 DE-92 DE-634 DE-859 DE-898 DE-BY-UBR DE-573 DE-861 DE-706 DE-188 DE-863 DE-BY-FWS DE-862 DE-BY-FWS |
physical | 1 Online-Ressource (XX, 459 S.) Ill., graph. Darst. |
psigel | ZDB-2-ENG ZDB-38-EBR |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | Springer |
record_format | marc |
spellingShingle | Security, Privacy and Trust in Cloud Systems Part I Cloud Computing Fundamentals -- Introduction to cloud computing -- Secure information sharing and data protection in the cloud -- Intra and inter-cloud security, privacy and trust -- Cloud-based eGovernance -- Part II Cloud Security -- Cloud security architecture and protocol -- Secure cloud data management service -- Security and virtualization -- Autonomic security in cloud systems -- Part III Cloud Privacy -- Cryptography and crypto-protocols for cloud systems -- Access control mechanisms -- Risk management in the cloud -- Privacy protection policies in cloud platforms and operations -- Part IV Cloud Trust -- Trust models for cloud services -- QoS-based trust model and QoS monitoring mechanism -- Cloud compliance -- Non-repudiation and reputation in the cloud -- Part V Case Studies -- Secure cloud platforms and applications -- Enterprise cloud security case study -- Open research issues in cloud security and future roadmap -- Cloud and eGovernment tutorial: Challenges, solutions and experiences Engineering Data protection Data encryption (Computer science) Telecommunication Communications Engineering, Networks Systems and Data Security Data Encryption Ingenieurwissenschaften Cloud Computing (DE-588)7623494-0 gnd Kryptologie (DE-588)4033329-2 gnd Dienstgüte (DE-588)4496068-2 gnd Privatsphäre (DE-588)4123980-5 gnd Trusted Computing (DE-588)7562931-8 gnd Zugriffskontrolle (DE-588)4293034-0 gnd |
subject_GND | (DE-588)7623494-0 (DE-588)4033329-2 (DE-588)4496068-2 (DE-588)4123980-5 (DE-588)7562931-8 (DE-588)4293034-0 (DE-588)4143413-4 |
title | Security, Privacy and Trust in Cloud Systems |
title_auth | Security, Privacy and Trust in Cloud Systems |
title_exact_search | Security, Privacy and Trust in Cloud Systems |
title_full | Security, Privacy and Trust in Cloud Systems edited by Surya Nepal, Mukaddim Pathan |
title_fullStr | Security, Privacy and Trust in Cloud Systems edited by Surya Nepal, Mukaddim Pathan |
title_full_unstemmed | Security, Privacy and Trust in Cloud Systems edited by Surya Nepal, Mukaddim Pathan |
title_short | Security, Privacy and Trust in Cloud Systems |
title_sort | security privacy and trust in cloud systems |
topic | Engineering Data protection Data encryption (Computer science) Telecommunication Communications Engineering, Networks Systems and Data Security Data Encryption Ingenieurwissenschaften Cloud Computing (DE-588)7623494-0 gnd Kryptologie (DE-588)4033329-2 gnd Dienstgüte (DE-588)4496068-2 gnd Privatsphäre (DE-588)4123980-5 gnd Trusted Computing (DE-588)7562931-8 gnd Zugriffskontrolle (DE-588)4293034-0 gnd |
topic_facet | Engineering Data protection Data encryption (Computer science) Telecommunication Communications Engineering, Networks Systems and Data Security Data Encryption Ingenieurwissenschaften Cloud Computing Kryptologie Dienstgüte Privatsphäre Trusted Computing Zugriffskontrolle Aufsatzsammlung |
url | https://doi.org/10.1007/978-3-642-38586-5 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026917172&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026917172&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT nepalsurya securityprivacyandtrustincloudsystems AT pathanmukaddim securityprivacyandtrustincloudsystems |