Language:
English
繁體中文
Help
圖資館首頁
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Modern principles, practices, and al...
~
Gupta, Brij, (1982-)
Modern principles, practices, and algorithms for cloud security
Record Type:
Electronic resources : Monograph/item
Title/Author:
Modern principles, practices, and algorithms for cloud securityedited by Brij B. Gupta.
other author:
Gupta, Brij,
Published:
Hershey, Pennsylvania :IGI Global,2019.
Description:
1 online resource (xvii, 344 p.)
Subject:
Cloud computingSecurity measures.
Online resource:
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-1082-7
ISBN:
9781799810841 (ebk.)
Modern principles, practices, and algorithms for cloud security
Modern principles, practices, and algorithms for cloud security
[electronic resource] /edited by Brij B. Gupta. - Hershey, Pennsylvania :IGI Global,2019. - 1 online resource (xvii, 344 p.)
Includes bibliographical references and index.
Chapter 1. Security- and privacy-aware computing in cloud with user mobility: an extensive review -- Chapter 2. Recent advances delivered in mobile cloud computing's security and management challenges -- Chapter 3. Security for cross-tenant access control in cloud computing -- Chapter 4. Secure identity-based proxy signature with computational diffie-Hellman for cloud data management -- Chapter 5. Cloud computing adoption: a scale development approach -- Chapter 6. A computational approach for secure cloud computing environments -- Chapter 7. Security threats and recent countermeasures in cloud computing -- Chapter 8. A framework strategy to overcome trust issues on cloud computing adoption in higher education -- Chapter 9. A proposal of improvement for transmission channels in cloud environments using the CBEDE methodology -- Chapter 10. Meta-heuristic and non-meta-heuristic energy-efficient load balancing algorithms in cloud computing -- Chapter 11. Distributed algorithms for finding meta-paths of a large heterogeneous information network on cloud -- Chapter 12. A tree computing block chain protocol crypto-signature model -- Chapter 13. Automate model transformation from CIM to PIM up to PSM in model-driven architecture.
Restricted to subscribers or individual electronic text purchasers.
"This book examines the principles, algorithms, applications, and practices of security in cloud computing"--
ISBN: 9781799810841 (ebk.)Subjects--Topical Terms:
404090
Cloud computing
--Security measures.
LC Class. No.: QA76.585 / .M6434 2019e
Dewey Class. No.: 004.67/82
Modern principles, practices, and algorithms for cloud security
LDR
:02355nmm a2200277 a 4500
001
584224
003
IGIG
005
20201224101415.0
006
m o d
007
cr cn
008
210202s2019 pau fob 001 0 eng d
020
$a
9781799810841 (ebk.)
020
$a
9781799810827 (hbk.)
020
$a
9781799810834 (pbk.)
035
$a
(OCoLC)1122549004
035
$a
1091218064
040
$a
CaBNVSL
$b
eng
$c
CaBNVSL
$d
CaBNVSL
050
0 0
$a
QA76.585
$b
.M6434 2019e
082
0 0
$a
004.67/82
$2
23
245
0 0
$a
Modern principles, practices, and algorithms for cloud security
$h
[electronic resource] /
$c
edited by Brij B. Gupta.
260
$a
Hershey, Pennsylvania :
$b
IGI Global,
$c
2019.
300
$a
1 online resource (xvii, 344 p.)
504
$a
Includes bibliographical references and index.
505
0
$a
Chapter 1. Security- and privacy-aware computing in cloud with user mobility: an extensive review -- Chapter 2. Recent advances delivered in mobile cloud computing's security and management challenges -- Chapter 3. Security for cross-tenant access control in cloud computing -- Chapter 4. Secure identity-based proxy signature with computational diffie-Hellman for cloud data management -- Chapter 5. Cloud computing adoption: a scale development approach -- Chapter 6. A computational approach for secure cloud computing environments -- Chapter 7. Security threats and recent countermeasures in cloud computing -- Chapter 8. A framework strategy to overcome trust issues on cloud computing adoption in higher education -- Chapter 9. A proposal of improvement for transmission channels in cloud environments using the CBEDE methodology -- Chapter 10. Meta-heuristic and non-meta-heuristic energy-efficient load balancing algorithms in cloud computing -- Chapter 11. Distributed algorithms for finding meta-paths of a large heterogeneous information network on cloud -- Chapter 12. A tree computing block chain protocol crypto-signature model -- Chapter 13. Automate model transformation from CIM to PIM up to PSM in model-driven architecture.
506
$a
Restricted to subscribers or individual electronic text purchasers.
520
3
$a
"This book examines the principles, algorithms, applications, and practices of security in cloud computing"--
$c
Provided by publisher.
650
0
$a
Cloud computing
$x
Security measures.
$3
404090
700
1
$a
Gupta, Brij,
$d
1982-
$e
editor.
$3
777857
856
4 0
$u
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-1082-7
based on 0 review(s)
ALL
電子館藏
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
000000188695
電子館藏
1圖書
電子書
EB QA76.585 .M6434 2019e 2019
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Multimedia file
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-1082-7
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login