000 04366nam a22005535i 4500
001 vtls000483436
003 RU-ToGU
005 20210922065727.0
007 cr nn 008mamaa
008 140715s2013 xxk| s |||| 0|eng d
020 _a9781447141891
_9978-1-4471-4189-1
024 7 _a10.1007/978-1-4471-4189-1
_2doi
035 _ato000483436
040 _aSpringer
_cSpringer
_dRU-ToGU
050 4 _aQA76.9.A73
050 4 _aQA76.9.S88
072 7 _aUYD
_2bicssc
072 7 _aCOM032000
_2bisacsh
072 7 _aCOM067000
_2bisacsh
082 0 4 _a003.3
_223
100 1 _aPearson, Siani.
_eeditor.
_9414196
245 1 0 _aPrivacy and Security for Cloud Computing
_helectronic resource
_cedited by Siani Pearson, George Yee.
260 _aLondon :
_bSpringer London :
_bImprint: Springer,
_c2013.
300 _aXVI, 306 p. 69 illus.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
490 1 _aComputer Communications and Networks,
_x1617-7975
505 0 _aPart I: Introduction to the Issues -- Privacy, Security and Trust in Cloud Computing -- Part II: Law Enforcement and Audits -- Accessing Data in the Cloud: The Long Arm of the Law Enforcement Agent -- A Privacy Impact Assessment Tool for Cloud Computing -- Understanding Cloud Audits -- Part III: Security and Integrity -- Security Infrastructure for Dynamically Provisioned Cloud Infrastructure Services -- Modeling the Runtime Integrity of Cloud Servers: a Scoped Invariant Perspective -- Part IV: Risk Considerations -- Inadequacies of Current Risk Controls for the Cloud -- Enterprise Information Risk Management: Dealing with Cloud Computing.
520 _aDespite the enormous potential of cloud computing, consumer uncertainty and concern regarding issues of privacy, security and trust remain a major barrier to the switch to cloud models. This comprehensive and authoritative text/reference provides an in-depth analysis of the latest advances in privacy, security and risk technologies within cloud environments. Containing contributions from leading experts in the field, the text presents both a thorough introduction to the core issues, and a practical selection of innovative solutions to common problems. A Glossary is also included at the end of the book. Topics and features: Considers the various forensic challenges for legal access to data in a cloud computing environment Discusses privacy impact assessments for the cloud, and examines the use of cloud audits to attenuate cloud security problems Reviews conceptual issues, basic requirements and practical suggestions for provisioning dynamically configured access control services in the cloud Proposes scoped invariants as a primitive for analyzing a cloud server for its integrity properties Investigates the applicability of existing controls for mitigating information security risks to cloud computing environments Describes risk management for cloud computing from an enterprise perspective This pioneering volume is essential reading for business professionals, students and researchers interested in the field of privacy and security protection for the cloud, and/or complex service provisioning. Newcomers to these areas will benefit from the solid overview of the field, whereas established experts will value the novel, cutting-edge research described in the work.
650 0 _aComputer Science.
_9155490
650 0 _aOperating systems (Computers).
_9303025
650 0 _aComputer system performance.
_9303225
650 0 _aComputer network architectures.
_9566231
650 0 _aInformation systems.
_9303226
650 1 4 _aComputer Science.
_9155490
650 2 4 _aComputer System Implementation.
_9304234
650 2 4 _aSystem Performance and Evaluation.
_9303229
650 2 4 _aPerformance and Reliability.
_9566342
650 2 4 _aManagement of Computing and Information Systems.
_9303227
700 1 _aYee, George.
_eeditor.
_9414197
710 2 _aSpringerLink (Online service)
_9143950
773 0 _tSpringer eBooks
830 0 _aComputer Communications and Networks,
_9566482
856 4 0 _uhttp://dx.doi.org/10.1007/978-1-4471-4189-1
912 _aZDB-2-SCS
999 _c356585