Cloud management and security:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Chichester, West Sussex
John Wiley & Sons Inc.
2014
|
Schlagworte: | |
Online-Zugang: | FHA01 FRO01 FWS01 FWS02 UBG01 UBY01 Volltext |
Beschreibung: | 8.7 Framework workflow 119 8.8 Discussion and analysis 125 8.9 Summary 126 8.10 Exercises 127 References 127 9 Clouds chains of trust 129 9.1 Introduction 129 9.2 Software agents revision 130 9.3 Roots of and chains of trust definition 130 9.4 Intra-layer chains of trust 132 9.5 Trust across layers 140 9.6 Summary 143 9.7 Exercises 143 References 143 10 Provenance in Clouds 145 10.1 Introduction 145 10.2 Motivating scenarios 148 10.3 Log records management and requirements 150 10.4 Framework domain architecture 155 10.5 Framework software agents 157 10.6 Framework workflow 160 10.7 Threat analysis 171 10.8 Discussion and future directions 173 10.9 Exercises 175 References 175 11 Insiders 177 11.1 Introduction 177 11.2 Insiders definition 178 11.3 Conceptual models 182 11.4 Summary 185 11.5 Exercises 185 References 186 Part Three Practical examples 187 12 Real life examples 189 12.1 Open Stack 189 12.2 Amazon web services 195 12.3 Component architecture 197 12.4 Prototype 203 12.5 . - Includes bibliographical references and index "This book discusses the foundations of Cloud computing, and covers in detail two main aspects of Cloud computing"-- |
Beschreibung: | 1 Online-Ressource |
ISBN: | 9781118817063 1118817060 9781118817070 1118817079 9781118817087 1118817087 1118817095 9781306841177 1306841178 |
DOI: | 10.1002/9781118817087 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043396802 | ||
003 | DE-604 | ||
005 | 20220216 | ||
007 | cr|uuu---uuuuu | ||
008 | 160222s2014 |||| o||u| ||||||eng d | ||
020 | |a 9781118817063 |c Adobe PDF |9 978-1-118-81706-3 | ||
020 | |a 1118817060 |c Adobe PDF |9 1-118-81706-0 | ||
020 | |a 9781118817070 |c ePub |9 978-1-118-81707-0 | ||
020 | |a 1118817079 |c ePub |9 1-118-81707-9 | ||
020 | |a 9781118817087 |9 978-1-118-81708-7 | ||
020 | |a 1118817087 |9 1-118-81708-7 | ||
020 | |a 1118817095 |9 1-118-81709-5 | ||
020 | |a 9781306841177 |9 978-1-306-84117-7 | ||
020 | |a 1306841178 |9 1-306-84117-8 | ||
024 | 7 | |a 10.1002/9781118817087 |2 doi | |
035 | |a (ZDB-35-WIC)ocn880672205 | ||
035 | |a (OCoLC)880672205 | ||
035 | |a (DE-599)BVBBV043396802 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-Aug4 |a DE-863 |a DE-862 |a DE-861 |a DE-706 | ||
082 | 0 | |a 004.67/82 |2 23 | |
084 | |a ST 200 |0 (DE-625)143611: |2 rvk | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
100 | 1 | |a Abbadi, Imad M. |e Verfasser |0 (DE-588)1056895624 |4 aut | |
245 | 1 | 0 | |a Cloud management and security |c Imad M. Abbadi |
264 | 1 | |a Chichester, West Sussex |b John Wiley & Sons Inc. |c 2014 | |
300 | |a 1 Online-Ressource | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a 8.7 Framework workflow 119 8.8 Discussion and analysis 125 8.9 Summary 126 8.10 Exercises 127 References 127 9 Clouds chains of trust 129 9.1 Introduction 129 9.2 Software agents revision 130 9.3 Roots of and chains of trust definition 130 9.4 Intra-layer chains of trust 132 9.5 Trust across layers 140 9.6 Summary 143 9.7 Exercises 143 References 143 10 Provenance in Clouds 145 10.1 Introduction 145 10.2 Motivating scenarios 148 10.3 Log records management and requirements 150 10.4 Framework domain architecture 155 10.5 Framework software agents 157 10.6 Framework workflow 160 10.7 Threat analysis 171 10.8 Discussion and future directions 173 10.9 Exercises 175 References 175 11 Insiders 177 11.1 Introduction 177 11.2 Insiders definition 178 11.3 Conceptual models 182 11.4 Summary 185 11.5 Exercises 185 References 186 Part Three Practical examples 187 12 Real life examples 189 12.1 Open Stack 189 12.2 Amazon web services 195 12.3 Component architecture 197 12.4 Prototype 203 12.5 . - | ||
500 | |a Includes bibliographical references and index | ||
500 | |a "This book discusses the foundations of Cloud computing, and covers in detail two main aspects of Cloud computing"-- | ||
650 | 7 | |a TECHNOLOGY & ENGINEERING / Telecommunications |2 bisacsh | |
650 | 7 | |a Cloud computing |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Web services |2 fast | |
650 | 4 | |a Cloud computing | |
650 | 4 | |a Web services | |
650 | 4 | |a Computer security | |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Cloud Computing |0 (DE-588)7623494-0 |2 gnd |9 rswk-swf |
653 | |a Electronic books | ||
689 | 0 | 0 | |a Cloud Computing |0 (DE-588)7623494-0 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, Hardcover |z 978-1-118-81709-4 |
856 | 4 | 0 | |u https://doi.org/10.1002/9781118817087 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-35-WIC |a ZDB-35-WEL | ||
940 | 1 | |q UBG_PDA_WIC | |
999 | |a oai:aleph.bib-bvb.de:BVB01-028815386 | ||
966 | e | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9781118817087 |l FHA01 |p ZDB-35-WIC |q FHA_PDA_WIC_Kauf |x Verlag |3 Volltext | |
966 | e | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9781118817087 |l FRO01 |p ZDB-35-WIC |q FRO_PDA_WIC |x Verlag |3 Volltext | |
966 | e | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9781118817087 |l FWS01 |p ZDB-35-WIC |q FWS_PDA_WIC_Kauf |x Verlag |3 Volltext | |
966 | e | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9781118817087 |l FWS02 |p ZDB-35-WIC |q FWS_PDA_WIC_Kauf |x Verlag |3 Volltext | |
966 | e | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9781118817087 |l UBG01 |p ZDB-35-WIC |q UBG_PDA_WIC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1002/9781118817087 |l UBY01 |p ZDB-35-WIC |q UBY_PDA_WIC_Kauf |x Verlag |3 Volltext |
Datensatz im Suchindex
DE-BY-FWS_katkey | 610635 |
---|---|
_version_ | 1806179670933110784 |
any_adam_object | |
author | Abbadi, Imad M. |
author_GND | (DE-588)1056895624 |
author_facet | Abbadi, Imad M. |
author_role | aut |
author_sort | Abbadi, Imad M. |
author_variant | i m a im ima |
building | Verbundindex |
bvnumber | BV043396802 |
classification_rvk | ST 200 ST 277 |
collection | ZDB-35-WIC ZDB-35-WEL |
ctrlnum | (ZDB-35-WIC)ocn880672205 (OCoLC)880672205 (DE-599)BVBBV043396802 |
dewey-full | 004.67/82 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004.67/82 |
dewey-search | 004.67/82 |
dewey-sort | 14.67 282 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1002/9781118817087 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04197nmm a2200721zc 4500</leader><controlfield tag="001">BV043396802</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20220216 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">160222s2014 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781118817063</subfield><subfield code="c">Adobe PDF</subfield><subfield code="9">978-1-118-81706-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1118817060</subfield><subfield code="c">Adobe PDF</subfield><subfield code="9">1-118-81706-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781118817070</subfield><subfield code="c">ePub</subfield><subfield code="9">978-1-118-81707-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1118817079</subfield><subfield code="c">ePub</subfield><subfield code="9">1-118-81707-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781118817087</subfield><subfield code="9">978-1-118-81708-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1118817087</subfield><subfield code="9">1-118-81708-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1118817095</subfield><subfield code="9">1-118-81709-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781306841177</subfield><subfield code="9">978-1-306-84117-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1306841178</subfield><subfield code="9">1-306-84117-8</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1002/9781118817087</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-35-WIC)ocn880672205</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)880672205</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043396802</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-863</subfield><subfield code="a">DE-862</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-706</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004.67/82</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 200</subfield><subfield code="0">(DE-625)143611:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Abbadi, Imad M.</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1056895624</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cloud management and security</subfield><subfield code="c">Imad M. Abbadi</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Chichester, West Sussex</subfield><subfield code="b">John Wiley & Sons Inc.</subfield><subfield code="c">2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">8.7 Framework workflow 119 8.8 Discussion and analysis 125 8.9 Summary 126 8.10 Exercises 127 References 127 9 Clouds chains of trust 129 9.1 Introduction 129 9.2 Software agents revision 130 9.3 Roots of and chains of trust definition 130 9.4 Intra-layer chains of trust 132 9.5 Trust across layers 140 9.6 Summary 143 9.7 Exercises 143 References 143 10 Provenance in Clouds 145 10.1 Introduction 145 10.2 Motivating scenarios 148 10.3 Log records management and requirements 150 10.4 Framework domain architecture 155 10.5 Framework software agents 157 10.6 Framework workflow 160 10.7 Threat analysis 171 10.8 Discussion and future directions 173 10.9 Exercises 175 References 175 11 Insiders 177 11.1 Introduction 177 11.2 Insiders definition 178 11.3 Conceptual models 182 11.4 Summary 185 11.5 Exercises 185 References 186 Part Three Practical examples 187 12 Real life examples 189 12.1 Open Stack 189 12.2 Amazon web services 195 12.3 Component architecture 197 12.4 Prototype 203 12.5 . - </subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"This book discusses the foundations of Cloud computing, and covers in detail two main aspects of Cloud computing"--</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">TECHNOLOGY & ENGINEERING / Telecommunications</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cloud computing</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Web services</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cloud computing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Web services</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Cloud Computing</subfield><subfield code="0">(DE-588)7623494-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Electronic books</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Cloud Computing</subfield><subfield code="0">(DE-588)7623494-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, Hardcover</subfield><subfield code="z">978-1-118-81709-4</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1002/9781118817087</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-35-WIC</subfield><subfield code="a">ZDB-35-WEL</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">UBG_PDA_WIC</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028815386</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9781118817087</subfield><subfield code="l">FHA01</subfield><subfield code="p">ZDB-35-WIC</subfield><subfield code="q">FHA_PDA_WIC_Kauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9781118817087</subfield><subfield code="l">FRO01</subfield><subfield code="p">ZDB-35-WIC</subfield><subfield code="q">FRO_PDA_WIC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9781118817087</subfield><subfield code="l">FWS01</subfield><subfield code="p">ZDB-35-WIC</subfield><subfield code="q">FWS_PDA_WIC_Kauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9781118817087</subfield><subfield code="l">FWS02</subfield><subfield code="p">ZDB-35-WIC</subfield><subfield code="q">FWS_PDA_WIC_Kauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9781118817087</subfield><subfield code="l">UBG01</subfield><subfield code="p">ZDB-35-WIC</subfield><subfield code="q">UBG_PDA_WIC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1002/9781118817087</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-35-WIC</subfield><subfield code="q">UBY_PDA_WIC_Kauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043396802 |
illustrated | Not Illustrated |
indexdate | 2024-08-01T12:12:42Z |
institution | BVB |
isbn | 9781118817063 1118817060 9781118817070 1118817079 9781118817087 1118817087 1118817095 9781306841177 1306841178 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028815386 |
oclc_num | 880672205 |
open_access_boolean | |
owner | DE-Aug4 DE-863 DE-BY-FWS DE-862 DE-BY-FWS DE-861 DE-706 |
owner_facet | DE-Aug4 DE-863 DE-BY-FWS DE-862 DE-BY-FWS DE-861 DE-706 |
physical | 1 Online-Ressource |
psigel | ZDB-35-WIC ZDB-35-WEL UBG_PDA_WIC ZDB-35-WIC FHA_PDA_WIC_Kauf ZDB-35-WIC FRO_PDA_WIC ZDB-35-WIC FWS_PDA_WIC_Kauf ZDB-35-WIC UBG_PDA_WIC ZDB-35-WIC UBY_PDA_WIC_Kauf |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | John Wiley & Sons Inc. |
record_format | marc |
spellingShingle | Abbadi, Imad M. Cloud management and security TECHNOLOGY & ENGINEERING / Telecommunications bisacsh Cloud computing fast Computer security fast Web services fast Cloud computing Web services Computer security Computersicherheit (DE-588)4274324-2 gnd Cloud Computing (DE-588)7623494-0 gnd |
subject_GND | (DE-588)4274324-2 (DE-588)7623494-0 |
title | Cloud management and security |
title_auth | Cloud management and security |
title_exact_search | Cloud management and security |
title_full | Cloud management and security Imad M. Abbadi |
title_fullStr | Cloud management and security Imad M. Abbadi |
title_full_unstemmed | Cloud management and security Imad M. Abbadi |
title_short | Cloud management and security |
title_sort | cloud management and security |
topic | TECHNOLOGY & ENGINEERING / Telecommunications bisacsh Cloud computing fast Computer security fast Web services fast Cloud computing Web services Computer security Computersicherheit (DE-588)4274324-2 gnd Cloud Computing (DE-588)7623494-0 gnd |
topic_facet | TECHNOLOGY & ENGINEERING / Telecommunications Cloud computing Computer security Web services Computersicherheit Cloud Computing |
url | https://doi.org/10.1002/9781118817087 |
work_keys_str_mv | AT abbadiimadm cloudmanagementandsecurity |