Security for Cloud Storage Systems:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Dordrecht
Springer
2014
|
Schriftenreihe: | SpringerBriefs in Computer Science
|
Schlagworte: | |
Online-Zugang: | BFB01 BTU01 FHA01 FHM01 FHN01 FKE01 FRO01 UBG01 UBR01 UBT01 UBW01 UER01 UPA01 Volltext Inhaltsverzeichnis Abstract |
Beschreibung: | 91 p. |
ISBN: | 9781461478737 |
DOI: | 10.1007/978-1-4614-7873-7 |
Internformat
MARC
LEADER | 00000nmm a2200000 c 4500 | ||
---|---|---|---|
001 | BV041715755 | ||
003 | DE-604 | ||
005 | 20230526 | ||
007 | cr|uuu---uuuuu | ||
008 | 140303s2014 |||| o||u| ||||||eng d | ||
020 | |a 9781461478737 |c Online |9 978-1-4614-7873-7 | ||
024 | 7 | |a 10.1007/978-1-4614-7873-7 |2 doi | |
035 | |a (OCoLC)858985134 | ||
035 | |a (DE-599)BVBBV041715755 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-703 |a DE-20 |a DE-92 |a DE-859 |a DE-M347 |a DE-473 |a DE-522 |a DE-861 |a DE-Aug4 |a DE-29 |a DE-634 |a DE-739 |a DE-355 | ||
082 | 0 | |a 004 | |
084 | |a ST 200 |0 (DE-625)143611: |2 rvk | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
100 | 1 | |a Yang, Gang |e Verfasser |0 (DE-588)141859954 |4 aut | |
245 | 1 | 0 | |a Security for Cloud Storage Systems |c by Kan Yang, Xiaohua Jia |
264 | 1 | |a Dordrecht |b Springer |c 2014 | |
300 | |a 91 p. | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a SpringerBriefs in Computer Science | |
533 | |a Online-Ausgabe |f Springer eBook Collection / Computer Science | ||
534 | |c 2014 | ||
650 | 0 | 7 | |a Chiffrierung |0 (DE-588)4352893-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Informatik |0 (DE-588)4026894-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Cloud Computing |0 (DE-588)7623494-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datenschutz |0 (DE-588)4011134-9 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Informatik |0 (DE-588)4026894-9 |D s |
689 | 0 | 1 | |a Datenschutz |0 (DE-588)4011134-9 |D s |
689 | 0 | 2 | |a Chiffrierung |0 (DE-588)4352893-4 |D s |
689 | 0 | 3 | |a Cloud Computing |0 (DE-588)7623494-0 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Jia, Xiaohua |e Sonstige |4 oth | |
776 | 0 | 8 | |i Reproduktion von |a Yang, Gang |t Security for Cloud Storage Systems |d 2014 |
776 | 0 | 8 | |i Erscheint auch als |n Druckausgabe |z 978-1-4614-7872-0 |
856 | 4 | 0 | |u https://doi.org/10.1007/978-1-4614-7873-7 |x Verlag |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027162857&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027162857&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
912 | |a ZDB-2-SCS | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-027162857 | ||
966 | e | |u https://doi.org/10.1007/978-1-4614-7873-7 |l BFB01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4614-7873-7 |l BTU01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4614-7873-7 |l FHA01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4614-7873-7 |l FHM01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4614-7873-7 |l FHN01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4614-7873-7 |l FKE01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4614-7873-7 |l FRO01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4614-7873-7 |l UBG01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4614-7873-7 |l UBR01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4614-7873-7 |l UBT01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4614-7873-7 |l UBW01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4614-7873-7 |l UER01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4614-7873-7 |l UPA01 |p ZDB-2-SCS |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804151990729572352 |
---|---|
adam_text | SECURITY FOR CLOUD STORAGE SYSTEMS
/ YANG, KAN
: 2014
TABLE OF CONTENTS / INHALTSVERZEICHNIS
INTRODUCTION
TSAS: THIRD-PARTY STORAGE AUDITING SERVICE
ABAC: ATTRIBUTE-BASED ACCESS CONTROL
DAC-MACS: EFFECTIVE DATA ACCESS CONTROL FOR MULTI-AUTHORITY CLOUD
STORAGE SYSTEMS
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
SECURITY FOR CLOUD STORAGE SYSTEMS
/ YANG, KAN
: 2014
ABSTRACT / INHALTSTEXT
CLOUD STORAGE IS AN IMPORTANT SERVICE OF CLOUD COMPUTING, WHICH OFFERS
SERVICE FOR DATA OWNERS TO HOST THEIR DATA IN THE CLOUD. THIS NEW
PARADIGM OF DATA HOSTING AND DATA ACCESS SERVICES INTRODUCES TWO MAJOR
SECURITY CONCERNS. THE FIRST IS THE PROTECTION OF DATA INTEGRITY. DATA
OWNERS MAY NOT FULLY TRUST THE CLOUD SERVER AND WORRY THAT DATA STORED
IN THE CLOUD COULD BE CORRUPTED OR EVEN REMOVED. THE SECOND IS DATA
ACCESS CONTROL. DATA OWNERS MAY WORRY THAT SOME DISHONEST SERVERS
PROVIDE DATA ACCESS TO USERS THAT ARE NOT PERMITTED FOR PROFIT GAIN AND
THUS THEY CAN NO LONGER RELY ON THE SERVERS FOR ACCESS CONTROL. TO
PROTECT THE DATA INTEGRITY IN THE CLOUD, AN EFFICIENT AND SECURE DYNAMIC
AUDITING PROTOCOL IS INTRODUCED, WHICH CAN SUPPORT DYNAMIC AUDITING AND
BATCH AUDITING. TO ENSURE THE DATA SECURITY IN THE CLOUD, TWO EFFICIENT
AND SECURE DATA ACCESS CONTROL SCHEMES ARE INTRODUCED IN THIS BRIEF:
ABAC FOR SINGLE-AUTHORITY SYSTEMS AND DAC-MACS FOR MULTI-AUTHORITY
SYSTEMS. WHILE CIPHERTEXT-POLICY ATTRIBUTE-BASED ENCRYPTION (CP-ABE) IS
A PROMISING TECHNIQUE FOR ACCESS CONTROL OF ENCRYPTED DATA, THE EXISTING
SCHEMES CANNOT BE DIRECTLY APPLIED TO DATA ACCESS CONTROL FOR CLOUD
STORAGE SYSTEMS BECAUSE OF THE ATTRIBUTE REVOCATION PROBLEM. TO SOLVE
THE ATTRIBUTE REVOCATION PROBLEM, NEW REVOCABLE CP-ABE METHODS ARE
PROPOSED IN BOTH ABAC AND DAC-MACS.
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
|
any_adam_object | 1 |
author | Yang, Gang |
author_GND | (DE-588)141859954 |
author_facet | Yang, Gang |
author_role | aut |
author_sort | Yang, Gang |
author_variant | g y gy |
building | Verbundindex |
bvnumber | BV041715755 |
classification_rvk | ST 200 ST 277 |
collection | ZDB-2-SCS |
ctrlnum | (OCoLC)858985134 (DE-599)BVBBV041715755 |
dewey-full | 004 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004 |
dewey-search | 004 |
dewey-sort | 14 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-1-4614-7873-7 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03636nmm a2200685 c 4500</leader><controlfield tag="001">BV041715755</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20230526 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">140303s2014 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781461478737</subfield><subfield code="c">Online</subfield><subfield code="9">978-1-4614-7873-7</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-1-4614-7873-7</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)858985134</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV041715755</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-703</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-522</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-355</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 200</subfield><subfield code="0">(DE-625)143611:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Yang, Gang</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)141859954</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security for Cloud Storage Systems</subfield><subfield code="c">by Kan Yang, Xiaohua Jia</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Dordrecht</subfield><subfield code="b">Springer</subfield><subfield code="c">2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">91 p.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">SpringerBriefs in Computer Science</subfield></datafield><datafield tag="533" ind1=" " ind2=" "><subfield code="a">Online-Ausgabe</subfield><subfield code="f">Springer eBook Collection / Computer Science</subfield></datafield><datafield tag="534" ind1=" " ind2=" "><subfield code="c">2014</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Chiffrierung</subfield><subfield code="0">(DE-588)4352893-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Informatik</subfield><subfield code="0">(DE-588)4026894-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Cloud Computing</subfield><subfield code="0">(DE-588)7623494-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Informatik</subfield><subfield code="0">(DE-588)4026894-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Chiffrierung</subfield><subfield code="0">(DE-588)4352893-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Cloud Computing</subfield><subfield code="0">(DE-588)7623494-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Jia, Xiaohua</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Reproduktion von</subfield><subfield code="a">Yang, Gang</subfield><subfield code="t">Security for Cloud Storage Systems</subfield><subfield code="d">2014</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druckausgabe</subfield><subfield code="z">978-1-4614-7872-0</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-1-4614-7873-7</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027162857&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027162857&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027162857</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4614-7873-7</subfield><subfield code="l">BFB01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4614-7873-7</subfield><subfield code="l">BTU01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4614-7873-7</subfield><subfield code="l">FHA01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4614-7873-7</subfield><subfield code="l">FHM01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4614-7873-7</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4614-7873-7</subfield><subfield code="l">FKE01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4614-7873-7</subfield><subfield code="l">FRO01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4614-7873-7</subfield><subfield code="l">UBG01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4614-7873-7</subfield><subfield code="l">UBR01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4614-7873-7</subfield><subfield code="l">UBT01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4614-7873-7</subfield><subfield code="l">UBW01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4614-7873-7</subfield><subfield code="l">UER01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4614-7873-7</subfield><subfield code="l">UPA01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV041715755 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T01:03:36Z |
institution | BVB |
isbn | 9781461478737 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027162857 |
oclc_num | 858985134 |
open_access_boolean | |
owner | DE-703 DE-20 DE-92 DE-859 DE-M347 DE-473 DE-BY-UBG DE-522 DE-861 DE-Aug4 DE-29 DE-634 DE-739 DE-355 DE-BY-UBR |
owner_facet | DE-703 DE-20 DE-92 DE-859 DE-M347 DE-473 DE-BY-UBG DE-522 DE-861 DE-Aug4 DE-29 DE-634 DE-739 DE-355 DE-BY-UBR |
physical | 91 p. |
psigel | ZDB-2-SCS |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | Springer |
record_format | marc |
series2 | SpringerBriefs in Computer Science |
spelling | Yang, Gang Verfasser (DE-588)141859954 aut Security for Cloud Storage Systems by Kan Yang, Xiaohua Jia Dordrecht Springer 2014 91 p. txt rdacontent c rdamedia cr rdacarrier SpringerBriefs in Computer Science Online-Ausgabe Springer eBook Collection / Computer Science 2014 Chiffrierung (DE-588)4352893-4 gnd rswk-swf Informatik (DE-588)4026894-9 gnd rswk-swf Cloud Computing (DE-588)7623494-0 gnd rswk-swf Datenschutz (DE-588)4011134-9 gnd rswk-swf Informatik (DE-588)4026894-9 s Datenschutz (DE-588)4011134-9 s Chiffrierung (DE-588)4352893-4 s Cloud Computing (DE-588)7623494-0 s DE-604 Jia, Xiaohua Sonstige oth Reproduktion von Yang, Gang Security for Cloud Storage Systems 2014 Erscheint auch als Druckausgabe 978-1-4614-7872-0 https://doi.org/10.1007/978-1-4614-7873-7 Verlag Volltext Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027162857&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027162857&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA Abstract |
spellingShingle | Yang, Gang Security for Cloud Storage Systems Chiffrierung (DE-588)4352893-4 gnd Informatik (DE-588)4026894-9 gnd Cloud Computing (DE-588)7623494-0 gnd Datenschutz (DE-588)4011134-9 gnd |
subject_GND | (DE-588)4352893-4 (DE-588)4026894-9 (DE-588)7623494-0 (DE-588)4011134-9 |
title | Security for Cloud Storage Systems |
title_auth | Security for Cloud Storage Systems |
title_exact_search | Security for Cloud Storage Systems |
title_full | Security for Cloud Storage Systems by Kan Yang, Xiaohua Jia |
title_fullStr | Security for Cloud Storage Systems by Kan Yang, Xiaohua Jia |
title_full_unstemmed | Security for Cloud Storage Systems by Kan Yang, Xiaohua Jia |
title_short | Security for Cloud Storage Systems |
title_sort | security for cloud storage systems |
topic | Chiffrierung (DE-588)4352893-4 gnd Informatik (DE-588)4026894-9 gnd Cloud Computing (DE-588)7623494-0 gnd Datenschutz (DE-588)4011134-9 gnd |
topic_facet | Chiffrierung Informatik Cloud Computing Datenschutz |
url | https://doi.org/10.1007/978-1-4614-7873-7 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027162857&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027162857&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT yanggang securityforcloudstoragesystems AT jiaxiaohua securityforcloudstoragesystems |