Menu
Home
Advanced Search
Directory of Libraries
About lib.ir
Contact Us
History
عنوان
Security for cloud computing
پدید آورنده
/ Flavio Lombardi, Roberto Di Pietro
موضوع
Cloud computing -- Security measures
رده
TK
5105
.
59
.
L66
2015
کتابخانه
Library of College of Science University of Tehran
محل استقرار
استان:
Tehran
ـ شهر:
Tehran
تماس با کتابخانه :
61112616
-
66495290
-
021
INTERNATIONAL STANDARD BOOK NUMBER
(Number (ISBN
9781608079896
NATIONAL BIBLIOGRAPHY NUMBER
Country Code
IR
Number
27380
LANGUAGE OF THE ITEM
.Language of Text, Soundtrack etc
انگلیسی
COUNTRY OF PUBLICATION OR PRODUCTlON
Country of publication
IR
TITLE AND STATEMENT OF RESPONSIBILITY
Title Proper
Security for cloud computing
General Material Designation
[Book]
First Statement of Responsibility
/ Flavio Lombardi, Roberto Di Pietro
.PUBLICATION, DISTRIBUTION, ETC
Place of Publication, Distribution, etc.
Boston; London
Name of Publisher, Distributor, etc.
: Artech House
Date of Publication, Distribution, etc.
, 2015.
PHYSICAL DESCRIPTION
Specific Material Designation and Extent of Item
193 pages
Other Physical Details
: illustrations
Dimensions
; 24 cm.
SERIES
Series Title
(Artech House computer series)
INTERNAL BIBLIOGRAPHIES/INDEXES NOTE
Text of Note
Includes bibliographical references and index
CONTENTS NOTE
Text of Note
Machine generated contents note: 1.Introduction -- 1.1.Motivation -- 1.2.About this Book -- 1.3.Roadmap -- 2.Cloud Definition and Technologies -- 2.1.Defining the Cloud -- 2.2.Cloud Approaches and Technologies -- 2.2.1.Amazon Web Services -- 2.2.2.MS Azure -- 2.2.3.OpenStack -- 2.3.Outsourcing and the Cloud -- 2.4.Accreditation and Certification Issues -- 2.5.Conclusions -- 3.Cloud Security and Virtualization -- 3.1.Introduction -- 3.2.Cloud Security Issues -- 3.2.1.A Model for Cloud Security -- 3.3.General Cloud Protection -- 3.3.1.Threat Model -- 3.3.2.Requirements -- 3.3.3.Effective Monitoring -- 3.4.Technological Details -- 3.5.Attacks and Responses -- 3.5.1.Dealing with Attacks -- 3.6.Nested Virtualization and Finer-Grained Security -- 3.7.Relevant Contributions to Virtualization Security -- 3.8.Conclusion -- 4.Privacy Issues in the Cloud -- 4.1.Introduction -- 4.2.Cloud Privacy Issues -- 4.3.Encryption-Based Solutions For Confidentiality -- 4.4.Statistical Disclosure -- 4.5.Data Splitting -- 4.6.Other Security Aspects -- 4.7.Relevant Security Metrics -- 4.8.Other Relevant Approaches and Open Issues -- 4.9.Conclusion -- 5.Advanced Monitoring of Services -- 5.1.Introduction -- 5.1.1.Content and Organization -- 5.2.Modeling And Monitoring Approaches -- 5.2.1.VM Monitoring and Security -- 5.2.2.Modeling Complex Systems -- 5.3.Graph-Based Modeling and EPA -- 5.3.1.Advanced Scenario Graphs -- 5.3.2.Action Graph -- 5.3.3.Cooperating Graphs -- 5.3.4.Node (Re-)Labeling -- 5.4.Technological Details Discussion -- 5.5.Conclusion -- 6.Cloud Approaches to Resilience -- 6.1.Introduction -- 6.2.Problem Statement and Model -- 6.2.1.Modeling -- 6.3.Simpler Approaches -- 6.4.More Complex Approaches -- 6.4.1.Multiround Adaptive Assignment Matrix -- 6.4.2.A Possible Threat Model -- 6.4.3.Adaptive Approaches to Cheating Detection -- 6.5.Alternative Approaches to Reliability -- 6.6.Conclusion -- 7.Secure GPU Cloud -- 7.1.Introduction -- 7.2.GPUS and Computing -- 7.3.GPU Architectures -- 7.3.1.Global Memory -- 7.3.2.Shared Memory -- 7.3.3.Registers -- 7.4.GPU Cloud and Virtualization Approaches -- 7.4.1.Virtualized CUDA -- 7.4.2.GPU Cloud and Gaming -- 7.5.GPU Data Leakages -- 7.5.1.Exploiting Shared Memory -- 7.5.2.Exploiting Global Memory -- 7.6.Effective Solutions and Workarounds -- 7.7.Competing Technologies and Security -- 7.8.Conclusion -- 8.Security and Reliability of Cloud Networks -- 8.1.Introduction -- 8.2.Defining SDN and NFV -- 8.3.Virtual Networking Implementations -- 8.3.1.OpenDaylight -- 8.3.2.Open vSwitch -- 8.3.3.Ryu -- 8.4.Security Issues -- 8.5.Conclusion -- 9.Concluding Remarks -- 9.1.Summary of the Contributions -- 9.2.Boundary of the Presented Approaches and Outlook -- 9.3.A Perspective on Interesting Future Developments -- 10.References
TOPICAL NAME USED AS SUBJECT
Cloud computing -- Security measures
DEWEY DECIMAL CLASSIFICATION
Number
005
.
8
LIBRARY OF CONGRESS CLASSIFICATION
Class number
TK
5105
.
59
Book number
.
L66
2015
PERSONAL NAME - PRIMARY RESPONSIBILITY
Lombardi, Flavio
PERSONAL NAME - SECONDARY RESPONSIBILITY
Di Pietro, Roberto (Computer scientist)
ORIGINATING SOURCE
Country
Iran
Agency
University of Tehran. College of Science Library
LOCATION AND CALL NUMBER
Call Number
005.8
old catalog
BL
1
a
Y
Proposal/Bug Report
×
Proposal/Bug Report
×
Warning!
Enter The Information Carefully
Error Report
Proposal