skip to content
Security for cloud computing Preview this item
ClosePreview this item
Checking...

Security for cloud computing

Author: Flavio Lombardi
Publisher: Boston Artech House Publishers [2015] ©2015
Series: Artech House computer series; Artech House computer security series.
Edition/Format:   eBook : Document : EnglishView all editions and formats
Database:WorldCat
Summary:

This comprehensive new resource presents a highly informative overview of cloud computing security issues. This book focuses on relevant approaches aimed at monitoring and protecting computation and  Read more...

Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

 

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Additional Physical Format: Print version:
Lombardi, Flavio.
Security for cloud computing.
Norwood Artech House, [2015]
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Flavio Lombardi
ISBN: 9781608079902 1608079902
OCLC Number: 932097317
Description: 1 online resource (193 pages).
Contents: Machine generated contents note: 1.Introduction --
1.1.Motivation --
1.2.About this Book --
1.3.Roadmap --
2.Cloud Definition and Technologies --
2.1.Defining the Cloud --
2.2.Cloud Approaches and Technologies --
2.2.1.Amazon Web Services --
2.2.2.MS Azure --
2.2.3.OpenStack --
2.3.Outsourcing and the Cloud --
2.4.Accreditation and Certification Issues --
2.5.Conclusions --
3.Cloud Security and Virtualization --
3.1.Introduction --
3.2.Cloud Security Issues --
3.2.1.A Model for Cloud Security --
3.3.General Cloud Protection --
3.3.1.Threat Model --
3.3.2.Requirements --
3.3.3.Effective Monitoring --
3.4.Technological Details --
3.5.Attacks and Responses --
3.5.1.Dealing with Attacks --
3.6.Nested Virtualization and Finer-Grained Security --
3.7.Relevant Contributions to Virtualization Security --
3.8.Conclusion --
4.Privacy Issues in the Cloud --
4.1.Introduction --
4.2.Cloud Privacy Issues --
4.3.Encryption-Based Solutions For Confidentiality --
4.4.Statistical Disclosure --
4.5.Data Splitting --
4.6.Other Security Aspects --
4.7.Relevant Security Metrics --
4.8.Other Relevant Approaches and Open Issues --
4.9.Conclusion --
5.Advanced Monitoring of Services --
5.1.Introduction --
5.1.1.Content and Organization --
5.2.Modeling And Monitoring Approaches --
5.2.1.VM Monitoring and Security --
5.2.2.Modeling Complex Systems --
5.3.Graph-Based Modeling and EPA --
5.3.1.Advanced Scenario Graphs --
5.3.2.Action Graph --
5.3.3.Cooperating Graphs --
5.3.4.Node (Re-)Labeling --
5.4.Technological Details Discussion --
5.5.Conclusion --
6.Cloud Approaches to Resilience --
6.1.Introduction --
6.2.Problem Statement and Model --
6.2.1.Modeling --
6.3.Simpler Approaches --
6.4.More Complex Approaches --
6.4.1.Multiround Adaptive Assignment Matrix --
6.4.2.A Possible Threat Model --
6.4.3.Adaptive Approaches to Cheating Detection --
6.5.Alternative Approaches to Reliability --
6.6.Conclusion --
7.Secure GPU Cloud --
7.1.Introduction --
7.2.GPUS and Computing --
7.3.GPU Architectures --
7.3.1.Global Memory --
7.3.2.Shared Memory --
7.3.3.Registers --
7.4.GPU Cloud and Virtualization Approaches --
7.4.1.Virtualized CUDA --
7.4.2.GPU Cloud and Gaming --
7.5.GPU Data Leakages --
7.5.1.Exploiting Shared Memory --
7.5.2.Exploiting Global Memory --
7.6.Effective Solutions and Workarounds --
7.7.Competing Technologies and Security --
7.8.Conclusion --
8.Security and Reliability of Cloud Networks --
8.1.Introduction --
8.2.Defining SDN and NFV --
8.3.Virtual Networking Implementations --
8.3.1.OpenDaylight --
8.3.2.Open vSwitch --
8.3.3.Ryu --
8.4.Security Issues --
8.5.Conclusion --
9.Concluding Remarks --
9.1.Summary of the Contributions --
9.2.Boundary of the Presented Approaches and Outlook --
9.3.A Perspective on Interesting Future Developments --
10.References.
Series Title: Artech House computer series; Artech House computer security series.
Responsibility: Flavio Lombardi, Roberto Di Pietro.

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.

Similar Items

Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/932097317> # Security for cloud computing
    a schema:Book, schema:CreativeWork, schema:MediaObject ;
    library:oclcnum "932097317" ;
    library:placeOfPublication <http://id.loc.gov/vocabulary/countries/mau> ;
    schema:about <http://experiment.worldcat.org/entity/work/data/2833919976#Topic/cloud_computing_security_measures> ; # Cloud computing--Security measures
    schema:about <http://dewey.info/class/004.6782/e23/> ;
    schema:author <http://experiment.worldcat.org/entity/work/data/2833919976#Person/lombardi_flavio> ; # Flavio Lombardi
    schema:bookFormat schema:EBook ;
    schema:copyrightYear "2015" ;
    schema:datePublished "2015" ;
    schema:description "Machine generated contents note: 1.Introduction -- 1.1.Motivation -- 1.2.About this Book -- 1.3.Roadmap -- 2.Cloud Definition and Technologies -- 2.1.Defining the Cloud -- 2.2.Cloud Approaches and Technologies -- 2.2.1.Amazon Web Services -- 2.2.2.MS Azure -- 2.2.3.OpenStack -- 2.3.Outsourcing and the Cloud -- 2.4.Accreditation and Certification Issues -- 2.5.Conclusions -- 3.Cloud Security and Virtualization -- 3.1.Introduction -- 3.2.Cloud Security Issues -- 3.2.1.A Model for Cloud Security -- 3.3.General Cloud Protection -- 3.3.1.Threat Model -- 3.3.2.Requirements -- 3.3.3.Effective Monitoring -- 3.4.Technological Details -- 3.5.Attacks and Responses -- 3.5.1.Dealing with Attacks -- 3.6.Nested Virtualization and Finer-Grained Security -- 3.7.Relevant Contributions to Virtualization Security -- 3.8.Conclusion -- 4.Privacy Issues in the Cloud -- 4.1.Introduction -- 4.2.Cloud Privacy Issues -- 4.3.Encryption-Based Solutions For Confidentiality -- 4.4.Statistical Disclosure -- 4.5.Data Splitting -- 4.6.Other Security Aspects -- 4.7.Relevant Security Metrics -- 4.8.Other Relevant Approaches and Open Issues -- 4.9.Conclusion -- 5.Advanced Monitoring of Services -- 5.1.Introduction -- 5.1.1.Content and Organization -- 5.2.Modeling And Monitoring Approaches -- 5.2.1.VM Monitoring and Security -- 5.2.2.Modeling Complex Systems -- 5.3.Graph-Based Modeling and EPA -- 5.3.1.Advanced Scenario Graphs -- 5.3.2.Action Graph -- 5.3.3.Cooperating Graphs -- 5.3.4.Node (Re-)Labeling -- 5.4.Technological Details Discussion -- 5.5.Conclusion -- 6.Cloud Approaches to Resilience -- 6.1.Introduction -- 6.2.Problem Statement and Model -- 6.2.1.Modeling -- 6.3.Simpler Approaches -- 6.4.More Complex Approaches -- 6.4.1.Multiround Adaptive Assignment Matrix -- 6.4.2.A Possible Threat Model -- 6.4.3.Adaptive Approaches to Cheating Detection -- 6.5.Alternative Approaches to Reliability -- 6.6.Conclusion -- 7.Secure GPU Cloud -- 7.1.Introduction -- 7.2.GPUS and Computing -- 7.3.GPU Architectures -- 7.3.1.Global Memory -- 7.3.2.Shared Memory -- 7.3.3.Registers -- 7.4.GPU Cloud and Virtualization Approaches -- 7.4.1.Virtualized CUDA -- 7.4.2.GPU Cloud and Gaming -- 7.5.GPU Data Leakages -- 7.5.1.Exploiting Shared Memory -- 7.5.2.Exploiting Global Memory -- 7.6.Effective Solutions and Workarounds -- 7.7.Competing Technologies and Security -- 7.8.Conclusion -- 8.Security and Reliability of Cloud Networks -- 8.1.Introduction -- 8.2.Defining SDN and NFV -- 8.3.Virtual Networking Implementations -- 8.3.1.OpenDaylight -- 8.3.2.Open vSwitch -- 8.3.3.Ryu -- 8.4.Security Issues -- 8.5.Conclusion -- 9.Concluding Remarks -- 9.1.Summary of the Contributions -- 9.2.Boundary of the Presented Approaches and Outlook -- 9.3.A Perspective on Interesting Future Developments -- 10.References."@en ;
    schema:exampleOfWork <http://worldcat.org/entity/work/id/2833919976> ;
    schema:genre "Electronic books"@en ;
    schema:inLanguage "en" ;
    schema:isPartOf <http://experiment.worldcat.org/entity/work/data/2833919976#Series/artech_house_computer_series> ; # Artech House computer series
    schema:isPartOf <http://experiment.worldcat.org/entity/work/data/2833919976#Series/artech_house_computer_security_series> ; # Artech House computer security series.
    schema:isSimilarTo <http://worldcat.org/entity/work/data/2833919976#CreativeWork/security_for_cloud_computing> ;
    schema:name "Security for cloud computing"@en ;
    schema:productID "932097317" ;
    schema:url <http://alltitles.ebrary.com/Doc?id=11128260> ;
    schema:url <http://public.eblib.com/choice/PublicFullRecord.aspx?p=4186582> ;
    schema:workExample <http://worldcat.org/isbn/9781608079902> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/932097317> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/2833919976#Person/lombardi_flavio> # Flavio Lombardi
    a schema:Person ;
    schema:familyName "Lombardi" ;
    schema:givenName "Flavio" ;
    schema:name "Flavio Lombardi" ;
    .

<http://experiment.worldcat.org/entity/work/data/2833919976#Series/artech_house_computer_security_series> # Artech House computer security series.
    a bgn:PublicationSeries ;
    schema:hasPart <http://www.worldcat.org/oclc/932097317> ; # Security for cloud computing
    schema:name "Artech House computer security series." ;
    .

<http://experiment.worldcat.org/entity/work/data/2833919976#Series/artech_house_computer_series> # Artech House computer series
    a bgn:PublicationSeries ;
    schema:hasPart <http://www.worldcat.org/oclc/932097317> ; # Security for cloud computing
    schema:name "Artech House computer series" ;
    .

<http://experiment.worldcat.org/entity/work/data/2833919976#Topic/cloud_computing_security_measures> # Cloud computing--Security measures
    a schema:Intangible ;
    schema:name "Cloud computing--Security measures"@en ;
    .

<http://worldcat.org/entity/work/data/2833919976#CreativeWork/security_for_cloud_computing>
    a schema:CreativeWork ;
    rdfs:label "Security for cloud computing." ;
    schema:description "Print version:" ;
    schema:isSimilarTo <http://www.worldcat.org/oclc/932097317> ; # Security for cloud computing
    .

<http://worldcat.org/isbn/9781608079902>
    a schema:ProductModel ;
    schema:isbn "1608079902" ;
    schema:isbn "9781608079902" ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.