High Performance Cloud Auditing and Applications (Record no. 91953)

000 -LEADER
fixed length control field 04251nam a22004815i 4500
001 - CONTROL NUMBER
control field 978-1-4614-3296-8
003 - CONTROL NUMBER IDENTIFIER
control field DE-He213
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20140220082457.0
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr nn 008mamaa
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 131024s2014 xxu| s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781461432968
-- 978-1-4614-3296-8
024 7# - OTHER STANDARD IDENTIFIER
Standard number or code 10.1007/978-1-4614-3296-8
Source of number or code doi
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number Q342
072 #7 - SUBJECT CATEGORY CODE
Subject category code UYQ
Source bicssc
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM004000
Source bisacsh
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 006.3
Edition number 23
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Han, Keesook J.
Relator term editor.
245 10 - TITLE STATEMENT
Title High Performance Cloud Auditing and Applications
Medium [electronic resource] /
Statement of responsibility, etc edited by Keesook J. Han, Baek-Young Choi, Sejun Song.
264 #1 -
-- New York, NY :
-- Springer New York :
-- Imprint: Springer,
-- 2014.
300 ## - PHYSICAL DESCRIPTION
Extent XXIV, 360 p. 89 illus., 62 illus. in color.
Other physical details online resource.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
347 ## -
-- text file
-- PDF
-- rda
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note An Overview of Issues and Recent Developments in Cloud Computing and Storage Security -- Moving Target Defense for Cloud Infrastructures: Lessons from Botnets -- Secure Mobile Cloud Computing and Security Issues -- Information Fusion in a Cloud-Enabled Environment -- Diagnosing Vulnerability Patterns in Cloud Audit Logs -- Exploiting Timing Side Channel for Secure Cloud Scheduling -- Federated Cloud Security Architecture for Secure and Agile Clouds.-Trust-Based Access Control for Secure Computing -- Assured Information Sharing (AIS) Using Private Clouds -- GPGPU Computing for Cloud Auditing -- CPU-GPU System Designes for High Performance Cloud Computing -- MapReduce Performance in Federated Cloud Computing Envorionments -- Improving Cloud Performance with Router-based Filtering.                             .
520 ## - SUMMARY, ETC.
Summary, etc This book mainly focuses on cloud security and high performance computing for cloud auditing. The book discusses emerging challenges and techniques developed for high performance semantic cloud auditing, and presents the state of the art in cloud auditing, computing and security techniques with focus on technical aspects and feasibility of auditing issues in federated cloud computing environments.   In summer 2011, the United States Air Force Research Laboratory (AFRL) CyberBAT Cloud Security and Auditing Team initiated the exploration of the cloud security challenges and future cloud auditing research directions that are covered in this book. This work was supported by the United States government funds from the Air Force Office of Scientific Research (AFOSR), the AFOSR Summer Faculty Fellowship Program (SFFP), the Air Force Research Laboratory (AFRL) Visiting Faculty Research Program (VFRP), the National Science Foundation (NSF) and the National Institute of Health (NIH). All chapters were partially supported by the AFOSR Information Operations and Security Program extramural and intramural funds (AFOSR/RSL Program Manager: Dr. Robert Herklotz).   Key Features: ·         Contains surveys of cyber threats and security issues in cloud computing and presents secure cloud architectures ·         Presents in-depth cloud auditing techniques, federated cloud security architectures, cloud access control models, and access assured information sharing technologies ·         Outlines a wide range of challenges and provides solutions to manage and control very large and complex data sets                                                                               
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Engineering.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Software engineering.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Database management.
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Engineering.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computational Intelligence.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Database Management.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Information Systems Applications (incl. Internet).
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Software Engineering.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Choi, Baek-Young.
Relator term editor.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Song, Sejun.
Relator term editor.
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element SpringerLink (Online service)
773 0# - HOST ITEM ENTRY
Title Springer eBooks
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Printed edition:
International Standard Book Number 9781461432951
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier http://dx.doi.org/10.1007/978-1-4614-3296-8
912 ## -
-- ZDB-2-ENG

No items available.

2017 | The Technical University of Kenya Library | +254(020) 2219929, 3341639, 3343672 | library@tukenya.ac.ke | Haile Selassie Avenue