• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History

عنوان
Security for cloud computing

پدید آورنده
/ Flavio Lombardi, Roberto Di Pietro

موضوع
Cloud computing -- Security measures

رده
TK
5105
.
59
.
L66
2015

کتابخانه
Library of College of Science University of Tehran

محل استقرار
استان: Tehran ـ شهر: Tehran

Library of College of Science University of Tehran

تماس با کتابخانه : 61112616-66495290-021

INTERNATIONAL STANDARD BOOK NUMBER

(Number (ISBN
9781608079896

NATIONAL BIBLIOGRAPHY NUMBER

Country Code
IR
Number
27380

LANGUAGE OF THE ITEM

.Language of Text, Soundtrack etc
انگلیسی

COUNTRY OF PUBLICATION OR PRODUCTlON

Country of publication
IR

TITLE AND STATEMENT OF RESPONSIBILITY

Title Proper
Security for cloud computing
General Material Designation
[Book]
First Statement of Responsibility
/ Flavio Lombardi, Roberto Di Pietro

.PUBLICATION, DISTRIBUTION, ETC

Place of Publication, Distribution, etc.
Boston; London
Name of Publisher, Distributor, etc.
: Artech House
Date of Publication, Distribution, etc.
, 2015.

PHYSICAL DESCRIPTION

Specific Material Designation and Extent of Item
193 pages
Other Physical Details
: illustrations
Dimensions
; 24 cm.

SERIES

Series Title
(Artech House computer series)

INTERNAL BIBLIOGRAPHIES/INDEXES NOTE

Text of Note
Includes bibliographical references and index

CONTENTS NOTE

Text of Note
Machine generated contents note: 1.Introduction -- 1.1.Motivation -- 1.2.About this Book -- 1.3.Roadmap -- 2.Cloud Definition and Technologies -- 2.1.Defining the Cloud -- 2.2.Cloud Approaches and Technologies -- 2.2.1.Amazon Web Services -- 2.2.2.MS Azure -- 2.2.3.OpenStack -- 2.3.Outsourcing and the Cloud -- 2.4.Accreditation and Certification Issues -- 2.5.Conclusions -- 3.Cloud Security and Virtualization -- 3.1.Introduction -- 3.2.Cloud Security Issues -- 3.2.1.A Model for Cloud Security -- 3.3.General Cloud Protection -- 3.3.1.Threat Model -- 3.3.2.Requirements -- 3.3.3.Effective Monitoring -- 3.4.Technological Details -- 3.5.Attacks and Responses -- 3.5.1.Dealing with Attacks -- 3.6.Nested Virtualization and Finer-Grained Security -- 3.7.Relevant Contributions to Virtualization Security -- 3.8.Conclusion -- 4.Privacy Issues in the Cloud -- 4.1.Introduction -- 4.2.Cloud Privacy Issues -- 4.3.Encryption-Based Solutions For Confidentiality -- 4.4.Statistical Disclosure -- 4.5.Data Splitting -- 4.6.Other Security Aspects -- 4.7.Relevant Security Metrics -- 4.8.Other Relevant Approaches and Open Issues -- 4.9.Conclusion -- 5.Advanced Monitoring of Services -- 5.1.Introduction -- 5.1.1.Content and Organization -- 5.2.Modeling And Monitoring Approaches -- 5.2.1.VM Monitoring and Security -- 5.2.2.Modeling Complex Systems -- 5.3.Graph-Based Modeling and EPA -- 5.3.1.Advanced Scenario Graphs -- 5.3.2.Action Graph -- 5.3.3.Cooperating Graphs -- 5.3.4.Node (Re-)Labeling -- 5.4.Technological Details Discussion -- 5.5.Conclusion -- 6.Cloud Approaches to Resilience -- 6.1.Introduction -- 6.2.Problem Statement and Model -- 6.2.1.Modeling -- 6.3.Simpler Approaches -- 6.4.More Complex Approaches -- 6.4.1.Multiround Adaptive Assignment Matrix -- 6.4.2.A Possible Threat Model -- 6.4.3.Adaptive Approaches to Cheating Detection -- 6.5.Alternative Approaches to Reliability -- 6.6.Conclusion -- 7.Secure GPU Cloud -- 7.1.Introduction -- 7.2.GPUS and Computing -- 7.3.GPU Architectures -- 7.3.1.Global Memory -- 7.3.2.Shared Memory -- 7.3.3.Registers -- 7.4.GPU Cloud and Virtualization Approaches -- 7.4.1.Virtualized CUDA -- 7.4.2.GPU Cloud and Gaming -- 7.5.GPU Data Leakages -- 7.5.1.Exploiting Shared Memory -- 7.5.2.Exploiting Global Memory -- 7.6.Effective Solutions and Workarounds -- 7.7.Competing Technologies and Security -- 7.8.Conclusion -- 8.Security and Reliability of Cloud Networks -- 8.1.Introduction -- 8.2.Defining SDN and NFV -- 8.3.Virtual Networking Implementations -- 8.3.1.OpenDaylight -- 8.3.2.Open vSwitch -- 8.3.3.Ryu -- 8.4.Security Issues -- 8.5.Conclusion -- 9.Concluding Remarks -- 9.1.Summary of the Contributions -- 9.2.Boundary of the Presented Approaches and Outlook -- 9.3.A Perspective on Interesting Future Developments -- 10.References

TOPICAL NAME USED AS SUBJECT

Cloud computing -- Security measures

DEWEY DECIMAL CLASSIFICATION

Number
005
.
8

LIBRARY OF CONGRESS CLASSIFICATION

Class number
TK
5105
.
59
Book number
.
L66
2015

PERSONAL NAME - PRIMARY RESPONSIBILITY

Lombardi, Flavio

PERSONAL NAME - SECONDARY RESPONSIBILITY

Di Pietro, Roberto (Computer scientist)

ORIGINATING SOURCE

Country
Iran
Agency
University of Tehran. College of Science Library

LOCATION AND CALL NUMBER

Call Number
005.8

old catalog

BL
1

a
Y

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival