This one-stop reference covers a wide range of issues on data security in Cloud Computing ranging from accountability, to data provenance, identity and risk management.
This one-stop reference covers a wide range of issues on data security in Cloud Computing ranging from accountability, to data provenance, identity and risk management.Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
* Chapter 1: A data-centric view of cloud security * Chapter 2: Nomad: a framework for ensuring data confidentiality in mission-critical cloud-based applications * Chapter 3: Preserving privacy in pre-classification volume ray-casting of 3D images * Chapter 4: Multiprocessor system-on-chip for processing data in cloud computing * Chapter 5: Distributing encoded data for private processing in the cloud * Chapter 6: Data protection and mobility management for cloud * Chapter 7: Understanding software-defined perimeter * Chapter 8: Security, trust, and privacy for cloud computing in Transportation Cyber-Physical Systems * Chapter 9: Review of data leakage attack techniques in cloud systems * Chapter 10: Cloud computing and personal data processing: sorting-out legal requirements * Chapter 11: The Waikato Data Privacy Matrix * Chapter 12: Data provenance in cloud * Chapter 13: Security visualization for cloud computing: an overview
* Chapter 1: A data-centric view of cloud security * Chapter 2: Nomad: a framework for ensuring data confidentiality in mission-critical cloud-based applications * Chapter 3: Preserving privacy in pre-classification volume ray-casting of 3D images * Chapter 4: Multiprocessor system-on-chip for processing data in cloud computing * Chapter 5: Distributing encoded data for private processing in the cloud * Chapter 6: Data protection and mobility management for cloud * Chapter 7: Understanding software-defined perimeter * Chapter 8: Security, trust, and privacy for cloud computing in Transportation Cyber-Physical Systems * Chapter 9: Review of data leakage attack techniques in cloud systems * Chapter 10: Cloud computing and personal data processing: sorting-out legal requirements * Chapter 11: The Waikato Data Privacy Matrix * Chapter 12: Data provenance in cloud * Chapter 13: Security visualization for cloud computing: an overview
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497