It looks like you're offline.
Open Library logo
additional options menu

MARC Record from harvard_bibliographic_metadata

Record ID harvard_bibliographic_metadata/ab.bib.13.20150123.full.mrc:729084265:3813
Source harvard_bibliographic_metadata
Download Link /show-records/harvard_bibliographic_metadata/ab.bib.13.20150123.full.mrc:729084265:3813?format=raw

LEADER: 03813nam a22004695a 4500
001 013672290-3
005 20130614191224.0
008 120827s2013 xxk| s ||0| 0|eng d
020 $a9781447141891
020 $a9781447141891
020 $a9781447141884
024 7 $a10.1007/978-1-4471-4189-1$2doi
035 $a(Springer)9781447141891
040 $aSpringer
050 4 $aQA76.9.A73
050 4 $aQA76.9.S88
072 7 $aUYD$2bicssc
072 7 $aCOM032000$2bisacsh
072 7 $aCOM067000$2bisacsh
082 04 $a003.3$223
100 1 $aPearson, Siani.
245 10 $aPrivacy and Security for Cloud Computing /$cedited by Siani Pearson, George Yee.
260 $aLondon :$bSpringer London :$bImprint: Springer,$c2013.
300 $aXVI, 306 p. 69 illus.$bdigital.
490 0 $aComputer Communications and Networks,$x1617-7975
505 0 $aPart I: Introduction to the Issues -- Privacy, Security and Trust in Cloud Computing -- Part II: Law Enforcement and Audits -- Accessing Data in the Cloud: The Long Arm of the Law Enforcement Agent -- A Privacy Impact Assessment Tool for Cloud Computing -- Understanding Cloud Audits -- Part III: Security and Integrity -- Security Infrastructure for Dynamically Provisioned Cloud Infrastructure Services -- Modeling the Runtime Integrity of Cloud Servers: a Scoped Invariant Perspective -- Part IV: Risk Considerations -- Inadequacies of Current Risk Controls for the Cloud -- Enterprise Information Risk Management: Dealing with Cloud Computing.
520 $aDespite the enormous potential of cloud computing, consumer uncertainty and concern regarding issues of privacy, security and trust remain a major barrier to the switch to cloud models.This comprehensive and authoritative text/reference provides an in-depth analysis of the latest advances in privacy, security and risk technologies within cloud environments. Containing contributions from leading experts in the field, the text presents both a thorough introduction to the core issues, and a practical selection of innovative solutions to common problems. A Glossary is also included at the end of the book.Topics and features:Considers the various forensic challenges for legal access to data in a cloud computing environmentDiscusses privacy impact assessments for the cloud, and examines the use of cloud audits to attenuate cloud security problemsReviews conceptual issues, basic requirements and practical suggestions for provisioning dynamically configured access control services in the cloudProposes scoped invariants as a primitive for analyzing a cloud server for its integrity propertiesInvestigates the applicability of existing controls for mitigating information security risks to cloud computing environmentsDescribes risk management for cloud computing from an enterprise perspectiveThis pioneering volume is essential reading for business professionals, students and researchers interested in the field of privacy and security protection for the cloud, and/or complex service provisioning. Newcomers to these areas will benefit from the solid overview of the field, whereas established experts will value the novel, cutting-edge research described in the work.
650 10 $aComputer science.
650 0 $aOperating systems (Computers)
650 0 $aComputer science.
650 0 $aComputer system performance.
650 0 $aComputer network architectures.
650 0 $aInformation Systems.
650 24 $aComputer System Implementation.
650 24 $aSystem Performance and Evaluation.
650 24 $aPerformance and Reliability.
650 24 $aManagement of Computing and Information Systems.
700 1 $aYee, George.
776 08 $iPrinted edition:$z9781447141884
830 0 $aComputer communications and networks.
988 $a20130502
906 $0VEN