High Performance Cloud Auditing and Applications:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
2014
|
Schlagworte: | |
Online-Zugang: | BTU01 FHA01 FHI01 FHN01 FHR01 FKE01 FRO01 FWS01 FWS02 UBY01 Volltext |
Beschreibung: | This book mainly focuses on cloud security and high performance computing for cloud auditing. The book discusses emerging challenges and techniques developed for high performance semantic cloud auditing, and presents the state of the art in cloud auditing, computing and security techniques with focus on technical aspects and feasibility of auditing issues in federated cloud computing environments. In summer 2011, the United States Air Force Research Laboratory (AFRL) CyberBAT Cloud Security and Auditing Team initiated the exploration of the cloud security challenges and future cloud auditing research directions that are covered in this book. This work was supported by the United States government funds from the Air Force Office of Scientific Research (AFOSR), the AFOSR Summer Faculty Fellowship Program (SFFP), the Air Force Research Laboratory (AFRL) Visiting Faculty Research Program (VFRP), the National Science Foundation (NSF) and the National Institute of Health (NIH). All chapters were partially supported by the AFOSR Information Operations and Security Program extramural and intramural funds (AFOSR/RSL Program Manager: Dr. Robert Herklotz). Key Features: · Contains surveys of cyber threats and security issues in cloud computing and presents secure cloud architectures · Presents in-depth cloud auditing techniques, federated cloud security architectures, cloud access control models, and access assured information sharing technologies · Outlines a wide range of challenges and provides solutions to manage and control very large and complex data sets |
Beschreibung: | 1 Online-Ressource (XXIV, 360 p.) 89 illus., 62 illus. in color |
ISBN: | 9781461432968 |
DOI: | 10.1007/978-1-4614-3296-8 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV041470849 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 131210s2014 |||| o||u| ||||||eng d | ||
020 | |a 9781461432968 |9 978-1-4614-3296-8 | ||
024 | 7 | |a 10.1007/978-1-4614-3296-8 |2 doi | |
035 | |a (OCoLC)874381317 | ||
035 | |a (DE-599)BVBBV041470849 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-Aug4 |a DE-92 |a DE-634 |a DE-859 |a DE-898 |a DE-573 |a DE-861 |a DE-706 |a DE-863 |a DE-862 | ||
082 | 0 | |a 006.3 |2 23 | |
100 | 1 | |a Han, Keesook J. |e Verfasser |4 aut | |
245 | 1 | 0 | |a High Performance Cloud Auditing and Applications |c edited by Keesook J. Han, Baek-Young Choi, Sejun Song |
264 | 1 | |c 2014 | |
300 | |a 1 Online-Ressource (XXIV, 360 p.) |b 89 illus., 62 illus. in color | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a This book mainly focuses on cloud security and high performance computing for cloud auditing. The book discusses emerging challenges and techniques developed for high performance semantic cloud auditing, and presents the state of the art in cloud auditing, computing and security techniques with focus on technical aspects and feasibility of auditing issues in federated cloud computing environments. In summer 2011, the United States Air Force Research Laboratory (AFRL) CyberBAT Cloud Security and Auditing Team initiated the exploration of the cloud security challenges and future cloud auditing research directions that are covered in this book. This work was supported by the United States government funds from the Air Force Office of Scientific Research (AFOSR), the AFOSR Summer Faculty Fellowship Program (SFFP), the Air Force Research Laboratory (AFRL) Visiting Faculty Research Program (VFRP), the National Science Foundation (NSF) and the National Institute of Health (NIH). All chapters were partially supported by the AFOSR Information Operations and Security Program extramural and intramural funds (AFOSR/RSL Program Manager: Dr. Robert Herklotz). Key Features: · Contains surveys of cyber threats and security issues in cloud computing and presents secure cloud architectures · Presents in-depth cloud auditing techniques, federated cloud security architectures, cloud access control models, and access assured information sharing technologies · Outlines a wide range of challenges and provides solutions to manage and control very large and complex data sets | ||
505 | 0 | |a An Overview of Issues and Recent Developments in Cloud Computing and Storage Security -- Moving Target Defense for Cloud Infrastructures: Lessons from Botnets -- Secure Mobile Cloud Computing and Security Issues -- Information Fusion in a Cloud-Enabled Environment -- Diagnosing Vulnerability Patterns in Cloud Audit Logs -- Exploiting Timing Side Channel for Secure Cloud Scheduling -- Federated Cloud Security Architecture for Secure and Agile Clouds.-Trust-Based Access Control for Secure Computing -- Assured Information Sharing (AIS) Using Private Clouds -- GPGPU Computing for Cloud Auditing -- CPU-GPU System Designes for High Performance Cloud Computing -- MapReduce Performance in Federated Cloud Computing Envorionments -- Improving Cloud Performance with Router-based Filtering | |
650 | 4 | |a Engineering | |
650 | 4 | |a Software engineering | |
650 | 4 | |a Database management | |
650 | 4 | |a Computational Intelligence | |
650 | 4 | |a Database Management | |
650 | 4 | |a Information Systems Applications (incl. Internet) | |
650 | 4 | |a Software Engineering | |
650 | 4 | |a Ingenieurwissenschaften | |
700 | 1 | |a Choi, Baek-Young |e Sonstige |4 oth | |
700 | 1 | |a Song, Sejun |e Sonstige |4 oth | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-1-4614-3296-8 |x Verlag |3 Volltext |
912 | |a ZDB-2-ENG | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-026916992 | ||
966 | e | |u https://doi.org/10.1007/978-1-4614-3296-8 |l BTU01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4614-3296-8 |l FHA01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4614-3296-8 |l FHI01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4614-3296-8 |l FHN01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4614-3296-8 |l FHR01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4614-3296-8 |l FKE01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4614-3296-8 |l FRO01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4614-3296-8 |l FWS01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4614-3296-8 |l FWS02 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4614-3296-8 |l UBY01 |p ZDB-2-ENG |x Verlag |3 Volltext |
Datensatz im Suchindex
DE-BY-FWS_katkey | 1015655 |
---|---|
_version_ | 1806174832708026368 |
any_adam_object | |
author | Han, Keesook J. |
author_facet | Han, Keesook J. |
author_role | aut |
author_sort | Han, Keesook J. |
author_variant | k j h kj kjh |
building | Verbundindex |
bvnumber | BV041470849 |
collection | ZDB-2-ENG |
contents | An Overview of Issues and Recent Developments in Cloud Computing and Storage Security -- Moving Target Defense for Cloud Infrastructures: Lessons from Botnets -- Secure Mobile Cloud Computing and Security Issues -- Information Fusion in a Cloud-Enabled Environment -- Diagnosing Vulnerability Patterns in Cloud Audit Logs -- Exploiting Timing Side Channel for Secure Cloud Scheduling -- Federated Cloud Security Architecture for Secure and Agile Clouds.-Trust-Based Access Control for Secure Computing -- Assured Information Sharing (AIS) Using Private Clouds -- GPGPU Computing for Cloud Auditing -- CPU-GPU System Designes for High Performance Cloud Computing -- MapReduce Performance in Federated Cloud Computing Envorionments -- Improving Cloud Performance with Router-based Filtering |
ctrlnum | (OCoLC)874381317 (DE-599)BVBBV041470849 |
dewey-full | 006.3 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 006 - Special computer methods |
dewey-raw | 006.3 |
dewey-search | 006.3 |
dewey-sort | 16.3 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-1-4614-3296-8 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04846nmm a2200565zc 4500</leader><controlfield tag="001">BV041470849</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">131210s2014 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781461432968</subfield><subfield code="9">978-1-4614-3296-8</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-1-4614-3296-8</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)874381317</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV041470849</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-863</subfield><subfield code="a">DE-862</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">006.3</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Han, Keesook J.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">High Performance Cloud Auditing and Applications</subfield><subfield code="c">edited by Keesook J. Han, Baek-Young Choi, Sejun Song</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XXIV, 360 p.)</subfield><subfield code="b">89 illus., 62 illus. in color</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">This book mainly focuses on cloud security and high performance computing for cloud auditing. The book discusses emerging challenges and techniques developed for high performance semantic cloud auditing, and presents the state of the art in cloud auditing, computing and security techniques with focus on technical aspects and feasibility of auditing issues in federated cloud computing environments. In summer 2011, the United States Air Force Research Laboratory (AFRL) CyberBAT Cloud Security and Auditing Team initiated the exploration of the cloud security challenges and future cloud auditing research directions that are covered in this book. This work was supported by the United States government funds from the Air Force Office of Scientific Research (AFOSR), the AFOSR Summer Faculty Fellowship Program (SFFP), the Air Force Research Laboratory (AFRL) Visiting Faculty Research Program (VFRP), the National Science Foundation (NSF) and the National Institute of Health (NIH). All chapters were partially supported by the AFOSR Information Operations and Security Program extramural and intramural funds (AFOSR/RSL Program Manager: Dr. Robert Herklotz). Key Features: · Contains surveys of cyber threats and security issues in cloud computing and presents secure cloud architectures · Presents in-depth cloud auditing techniques, federated cloud security architectures, cloud access control models, and access assured information sharing technologies · Outlines a wide range of challenges and provides solutions to manage and control very large and complex data sets</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">An Overview of Issues and Recent Developments in Cloud Computing and Storage Security -- Moving Target Defense for Cloud Infrastructures: Lessons from Botnets -- Secure Mobile Cloud Computing and Security Issues -- Information Fusion in a Cloud-Enabled Environment -- Diagnosing Vulnerability Patterns in Cloud Audit Logs -- Exploiting Timing Side Channel for Secure Cloud Scheduling -- Federated Cloud Security Architecture for Secure and Agile Clouds.-Trust-Based Access Control for Secure Computing -- Assured Information Sharing (AIS) Using Private Clouds -- GPGPU Computing for Cloud Auditing -- CPU-GPU System Designes for High Performance Cloud Computing -- MapReduce Performance in Federated Cloud Computing Envorionments -- Improving Cloud Performance with Router-based Filtering</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Engineering</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Software engineering</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Database management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computational Intelligence</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Database Management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information Systems Applications (incl. Internet)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Software Engineering</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Ingenieurwissenschaften</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Choi, Baek-Young</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Song, Sejun</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-1-4614-3296-8</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-ENG</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-026916992</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4614-3296-8</subfield><subfield code="l">BTU01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4614-3296-8</subfield><subfield code="l">FHA01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4614-3296-8</subfield><subfield code="l">FHI01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4614-3296-8</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4614-3296-8</subfield><subfield code="l">FHR01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4614-3296-8</subfield><subfield code="l">FKE01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4614-3296-8</subfield><subfield code="l">FRO01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4614-3296-8</subfield><subfield code="l">FWS01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4614-3296-8</subfield><subfield code="l">FWS02</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4614-3296-8</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV041470849 |
illustrated | Illustrated |
indexdate | 2024-08-01T10:55:48Z |
institution | BVB |
isbn | 9781461432968 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-026916992 |
oclc_num | 874381317 |
open_access_boolean | |
owner | DE-Aug4 DE-92 DE-634 DE-859 DE-898 DE-BY-UBR DE-573 DE-861 DE-706 DE-863 DE-BY-FWS DE-862 DE-BY-FWS |
owner_facet | DE-Aug4 DE-92 DE-634 DE-859 DE-898 DE-BY-UBR DE-573 DE-861 DE-706 DE-863 DE-BY-FWS DE-862 DE-BY-FWS |
physical | 1 Online-Ressource (XXIV, 360 p.) 89 illus., 62 illus. in color |
psigel | ZDB-2-ENG |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
record_format | marc |
spellingShingle | Han, Keesook J. High Performance Cloud Auditing and Applications An Overview of Issues and Recent Developments in Cloud Computing and Storage Security -- Moving Target Defense for Cloud Infrastructures: Lessons from Botnets -- Secure Mobile Cloud Computing and Security Issues -- Information Fusion in a Cloud-Enabled Environment -- Diagnosing Vulnerability Patterns in Cloud Audit Logs -- Exploiting Timing Side Channel for Secure Cloud Scheduling -- Federated Cloud Security Architecture for Secure and Agile Clouds.-Trust-Based Access Control for Secure Computing -- Assured Information Sharing (AIS) Using Private Clouds -- GPGPU Computing for Cloud Auditing -- CPU-GPU System Designes for High Performance Cloud Computing -- MapReduce Performance in Federated Cloud Computing Envorionments -- Improving Cloud Performance with Router-based Filtering Engineering Software engineering Database management Computational Intelligence Database Management Information Systems Applications (incl. Internet) Software Engineering Ingenieurwissenschaften |
title | High Performance Cloud Auditing and Applications |
title_auth | High Performance Cloud Auditing and Applications |
title_exact_search | High Performance Cloud Auditing and Applications |
title_full | High Performance Cloud Auditing and Applications edited by Keesook J. Han, Baek-Young Choi, Sejun Song |
title_fullStr | High Performance Cloud Auditing and Applications edited by Keesook J. Han, Baek-Young Choi, Sejun Song |
title_full_unstemmed | High Performance Cloud Auditing and Applications edited by Keesook J. Han, Baek-Young Choi, Sejun Song |
title_short | High Performance Cloud Auditing and Applications |
title_sort | high performance cloud auditing and applications |
topic | Engineering Software engineering Database management Computational Intelligence Database Management Information Systems Applications (incl. Internet) Software Engineering Ingenieurwissenschaften |
topic_facet | Engineering Software engineering Database management Computational Intelligence Database Management Information Systems Applications (incl. Internet) Software Engineering Ingenieurwissenschaften |
url | https://doi.org/10.1007/978-1-4614-3296-8 |
work_keys_str_mv | AT hankeesookj highperformancecloudauditingandapplications AT choibaekyoung highperformancecloudauditingandapplications AT songsejun highperformancecloudauditingandapplications |