Handbook of research on security considerations in cloud computing

"This book brings together discussion on current approaches to cloud-based technologies and assesses the possibilities for future advancements in this field by highlighting the need for consumers to understand the unique nature of cloud-delivered security and to evaluate the different aspects o...

Full description

Saved in:
Bibliographic Details
Other Authors: Munir, Kashif, 1976- (Editor), Al-Mutairi, Mubarak S., 1971- (Editor), Mohammed, Lawan Ahmed, 1968- (Editor)
Format: eBook
Language: English
Published: Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, PA 17033, USA) : IGI Global, [2015]
Subjects:
ISBN: 9781466683884
1466683880
9781680158304
1680158309
9781466683877
Physical Description: 1 online resource (PDFs (408 pages)) : illustrations

Cover

Table of contents

LEADER 04424cam a2200445 i 4500
001 kn-ocn919099449
003 OCoLC
005 20240717213016.0
006 m o d
007 cr cn|||||||||
008 150822s2015 paua fobf 001 0 eng d
040 |a IGIGL  |b eng  |e rda  |e pn  |c IGIGL  |d OCLCO  |d N$T  |d CDX  |d KNOVL  |d EBLCP  |d NRC  |d OCLCF  |d OL$  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCL  |d OCLCQ 
020 |a 9781466683884  |q (electronic bk.) 
020 |a 1466683880  |q (electronic bk.) 
020 |a 9781680158304  |q (electronic bk.) 
020 |a 1680158309  |q (electronic bk.) 
020 |z 9781466683877  |q (print) 
024 7 |a 10.4018/978-1-4666-8387-7  |2 doi 
035 |a (OCoLC)919099449 
245 0 0 |a Handbook of research on security considerations in cloud computing /  |c Kashif Munir, Mubarak S. Al-Mutairi, and Lawan A. Mohammed, editors. 
264 1 |a Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, PA 17033, USA) :  |b IGI Global,  |c [2015] 
300 |a 1 online resource (PDFs (408 pages)) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a electronic  |2 isbdmedia 
338 |a online resource  |b cr  |2 rdacarrier 
504 |a Includes bibliographical references and index. 
505 0 |a Security issues in cloud computing / Subhash Chandra Patel, R.S. Singh, Sumit Jaiswal -- Cloud computing security: abuse and nefarious use of cloud computing / Marwan Omar -- Cloud security using ear biometrics / Santosh Kumar, Ali Imam Abidi, Sanjay Kumar Singh -- Secure architecture for cloud environment / Kashif Munir, Sellapan Palaniappan -- Governance and risk management in the cloud with cloud controls Matrix V3 and ISO/IEC 38500:2008 / Abhik Chaudhuri -- Authentication and error resilience in images transmitted through open environment / Qurban A Memon -- Trust calculation using fuzzy logic in cloud computing / Rajanpreet Kaur Chahal, Sarbjeet Singh -- Advances in information, security, privacy & ethics: use of cloud computing for education / Joseph M. Woodside -- Networked multimedia communication systems / Piyush Kumar Shukla, Kirti Raj Bhatele -- Data security issues and solutions in cloud computing / Abhishek Majumder, Sudipta Roy, Satarupa Biswas -- Improving privacy and security in multicloud architectures / Piyush Kumar Shukla, Mahendra Kumar Ahirwar -- Hard clues in soft environments: the cloud's influence on digital forensics / Andrea Atzeni, Paolo Smiraglia, Andrea Siringo -- Security challenges for cloud computing development framework in Saudi Arabia / Lawan A. Mohammed, Kashif Munir -- Big data security: challenges, recommendations and solutions / Fatima-Zahra Benjelloun, Ayoub Ait Lahcen 
505 8 |a Access control framework for cloud computing / Kashif Munir, Lawan A. Mohammed -- Big data: an emerging field of data engineering / Piyush Kumar Shukla, Madhuvan Dixit -- Achieving efficient purging in transparent per-file secure wiping extensions / Wasim Ahmad Bhat -- Reliability, fault tolerance, and quality-of-service in cloud computing: analysing characteristics / Piyush Kumar Shukla, Gaurav Singh. 
506 |a Plný text je dostupný pouze z IP adres počítačů Univerzity Tomáše Bati ve Zlíně nebo vzdáleným přístupem pro zaměstnance a studenty 
520 3 |a "This book brings together discussion on current approaches to cloud-based technologies and assesses the possibilities for future advancements in this field by highlighting the need for consumers to understand the unique nature of cloud-delivered security and to evaluate the different aspects of this service to verify if it will meet their needs"--Provided by publisher. 
590 |a Knovel  |b Knovel (All titles) 
650 0 |a Cloud computing  |x Security measures  |v Handbooks, manuals, etc. 
655 7 |a elektronické knihy  |7 fd186907  |2 czenas 
655 9 |a electronic books  |2 eczenas 
700 1 |a Munir, Kashif,  |d 1976-  |e editor.  |1 https://id.oclc.org/worldcat/entity/E39PCjBkyTQCBht8c8tHdQcr7b 
700 1 |a Al-Mutairi, Mubarak S.,  |d 1971-  |e editor.  |1 https://id.oclc.org/worldcat/entity/E39PCjtJr6J3yxJvQ4xyjFf7wP 
700 1 |a Mohammed, Lawan Ahmed,  |d 1968-  |e editor.  |1 https://id.oclc.org/worldcat/entity/E39PCjrmTvHvt7hBK9Dx4mXxcP 
710 2 |a IGI Global,  |e publisher. 
776 0 8 |i Print version:  |z 1466683872  |z 9781466683877  |w (DLC) 2015008172 
856 4 0 |u https://proxy.k.utb.cz/login?url=https://app.knovel.com/hotlink/toc/id:kpHRSCCC03/handbook-of-research?kpromoter=marc  |y Full text