Security, Privacy and Trust in Cloud Systems (Record no. 93255)

000 -LEADER
fixed length control field 04237nam a22004695i 4500
001 - CONTROL NUMBER
control field 978-3-642-38586-5
003 - CONTROL NUMBER IDENTIFIER
control field DE-He213
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20140220082518.0
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr nn 008mamaa
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 130903s2014 gw | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9783642385865
-- 978-3-642-38586-5
024 7# - OTHER STANDARD IDENTIFIER
Standard number or code 10.1007/978-3-642-38586-5
Source of number or code doi
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number TK1-9971
072 #7 - SUBJECT CATEGORY CODE
Subject category code TJK
Source bicssc
072 #7 - SUBJECT CATEGORY CODE
Subject category code TEC041000
Source bisacsh
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 621.382
Edition number 23
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Nepal, Surya.
Relator term editor.
245 10 - TITLE STATEMENT
Title Security, Privacy and Trust in Cloud Systems
Medium [electronic resource] /
Statement of responsibility, etc edited by Surya Nepal, Mukaddim Pathan.
264 #1 -
-- Berlin, Heidelberg :
-- Springer Berlin Heidelberg :
-- Imprint: Springer,
-- 2014.
300 ## - PHYSICAL DESCRIPTION
Extent XX, 459 p. 146 illus., 95 illus. in color.
Other physical details online resource.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
347 ## -
-- text file
-- PDF
-- rda
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Part I Cloud Computing Fundamentals -- Introduction to cloud computing -- Secure information sharing and data protection in the cloud -- Intra and inter-cloud security, privacy and trust -- Cloud-based eGovernance -- Part II Cloud Security -- Cloud security architecture and protocol -- Secure cloud data management service -- Security and virtualization -- Autonomic security in cloud systems -- Part III Cloud Privacy -- Cryptography and crypto-protocols for cloud systems -- Access control mechanisms -- Risk management in the cloud -- Privacy protection policies in cloud platforms and operations -- Part IV Cloud Trust -- Trust models for cloud services -- QoS-based trust model and QoS monitoring mechanism -- Cloud compliance -- Non-repudiation and reputation in the cloud -- Part V Case Studies -- Secure cloud platforms and applications -- Enterprise cloud security case study -- Open research issues in cloud security and future roadmap -- Cloud and eGovernment tutorial: Challenges, solutions and experiences.
520 ## - SUMMARY, ETC.
Summary, etc The book compiles technologies for enhancing and provisioning security, privacy and trust in cloud systems based on Quality of Servise requirements. It is a timely contribution to a field that is gaining considerable research interest, momentum, and provides a comprehensive coverage of technologies related to cloud security, privacy and trust. In particular, the book includes - Cloud security fundamentals and related technologies to-date, with a comprehensive coverage of evolution, current landscape, and future roadmap. - A smooth organization with introductory, advanced and specialist content, i.e. from basics of security, privacy and trust in cloud systems, to advanced cartographic techniques, case studies covering both social and technological aspects, and advanced platforms. - Case studies written by professionals and/or industrial researchers. - Inclusion of a section on Cloud security and eGovernance tutorial that can be used for knowledge transfer and teaching purpose. - Identification of open research issues to help practitioners and researchers. The book is a timely topic for readers, including practicing engineers and academics, in the domains related to the engineering, science, and art of building networks and networked applications. Specifically, upon reading this book, audiences will perceive the following benefits: 1. Learn the state-of-the-art in research and development on cloud security, privacy and trust. 2. Obtain a future roadmap by learning open research issues. 3. Gather the background knowledge to tackle key problems, whose solutions will enhance the evolution of next-generation secure cloud systems.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Engineering.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data protection.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data encryption (Computer science).
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Telecommunication.
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Engineering.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Communications Engineering, Networks.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Systems and Data Security.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data Encryption.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Pathan, Mukaddim.
Relator term editor.
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element SpringerLink (Online service)
773 0# - HOST ITEM ENTRY
Title Springer eBooks
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Printed edition:
International Standard Book Number 9783642385858
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier http://dx.doi.org/10.1007/978-3-642-38586-5
912 ## -
-- ZDB-2-ENG

No items available.

2017 | The Technical University of Kenya Library | +254(020) 2219929, 3341639, 3343672 | library@tukenya.ac.ke | Haile Selassie Avenue