Improving security, privacy, and trust in cloud computing:
"Cloud computing adoption has revolutionized how businesses and individuals harness the power of technology. The cloud's scalability, accessibility, and cost-efficiency have propelled it to the forefront of modern computing paradigms. However, as organizations increasingly rely on cloud se...
Saved in:
Other Authors: | , , , |
---|---|
Format: | Electronic eBook |
Language: | English |
Published: |
Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA)
IGI Global
2024.
|
Subjects: | |
Online Access: | DE-862 DE-863 |
Summary: | "Cloud computing adoption has revolutionized how businesses and individuals harness the power of technology. The cloud's scalability, accessibility, and cost-efficiency have propelled it to the forefront of modern computing paradigms. However, as organizations increasingly rely on cloud services to store, process, and manage their data and applications, an intricate web of challenges has emerged, casting shadows over the very foundations of cloud computing. Improving Security, Privacy, and Trust in Cloud Computing unravels the complexities surrounding the cloud landscape, delving into the core concerns of security, privacy, and trust that have come to define its evolution. It aims to equip readers with the insights, knowledge, and practical strategies needed to navigate the intricate realm of cloud computing while safeguarding their most valuable assets. This book's exploration into security, privacy, and trust in cloud computing takes a holistic approach. Throughout the chapters of this book, readers will embark on a multidimensional expedition. This book will take them through real-world case studies of successful cloud security implementations and unfortunate breaches that underscore the urgency of robust defenses. From data encryption techniques to incident response protocols, this book offers practical insights and actionable strategies that can be implemented by IT professionals, security experts, and decision-makers alike."-- |
Physical Description: | 21 PDFs (299 Seiten) Also available in print. |
Format: | Mode of access: World Wide Web. |
Bibliography: | Includes bibliographical references and index. |
ISBN: | 9798369314326 |
Access: | Restricted to subscribers or individual electronic text purchasers. |
Staff View
MARC
LEADER | 00000nam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-98-IGB-00328093 | ||
003 | IGIG | ||
005 | 20240209134413.0 | ||
006 | m eo d | ||
007 | cr bn||||m|||a | ||
008 | 240209s2024 pau fob 001 0 eng d | ||
020 | |a 9798369314326 |q PDF | ||
020 | |z 9798369314319 |q print | ||
024 | 7 | |a 10.4018/979-8-3693-1431-9 |2 doi | |
035 | |a (CaBNVSL)slc00005537 | ||
035 | |a (OCoLC)1420825161 | ||
040 | |a CaBNVSL |b eng |e rda |c CaBNVSL |d CaBNVSL | ||
050 | 4 | |a QA76.585 |b .I47 2024e | |
082 | 7 | |a 005.8 |2 23 | |
245 | 0 | 0 | |a Improving security, privacy, and trust in cloud computing |c Pawan Kumar Goel, Hari Mohan Pandey, Amit Singhal, Sanyam Agarwal, editors. |
264 | 1 | |a Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) |b IGI Global |c 2024. | |
300 | |a 21 PDFs (299 Seiten) | ||
336 | |a text |2 rdacontent | ||
337 | |a electronic |2 isbdmedia | ||
338 | |a online resource |2 rdacarrier | ||
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a Chapter 1. Securing cloud infrastructure in IaaS and PaaS environments -- Chapter 2. Impact of artificial intelligence and machine learning in cloud security -- Chapter 3. An intelligent data retrieving technique and safety measures for sustainable cloud computing -- Chapter 4. Enhancing cloud security: the role of artificial intelligence and machine learning -- Chapter 5. Role-based access control (RBAC) and attribute-based access control (ABAC) -- Chapter 6. Application of artificial intelligence in cybersecurity -- Chapter 7. Accountable malicious entity detection using re-encryption mechanism to share data -- Chapter 8. Balancing innovation and security in the cloud: navigating the risks and rewards of the digital age -- Chapter 9. Data storage and transmission security in the cloud: the artificial intelligence (AI) edge -- Chapter 10. Privacy and surveillance in digital era: a case for India -- Chapter 11. A model for trust decision, data analysis, and evaluation to identify quality web services. | |
506 | |a Restricted to subscribers or individual electronic text purchasers. | ||
520 | 3 | |a "Cloud computing adoption has revolutionized how businesses and individuals harness the power of technology. The cloud's scalability, accessibility, and cost-efficiency have propelled it to the forefront of modern computing paradigms. However, as organizations increasingly rely on cloud services to store, process, and manage their data and applications, an intricate web of challenges has emerged, casting shadows over the very foundations of cloud computing. Improving Security, Privacy, and Trust in Cloud Computing unravels the complexities surrounding the cloud landscape, delving into the core concerns of security, privacy, and trust that have come to define its evolution. It aims to equip readers with the insights, knowledge, and practical strategies needed to navigate the intricate realm of cloud computing while safeguarding their most valuable assets. This book's exploration into security, privacy, and trust in cloud computing takes a holistic approach. Throughout the chapters of this book, readers will embark on a multidimensional expedition. This book will take them through real-world case studies of successful cloud security implementations and unfortunate breaches that underscore the urgency of robust defenses. From data encryption techniques to incident response protocols, this book offers practical insights and actionable strategies that can be implemented by IT professionals, security experts, and decision-makers alike."-- |c Provided by publisher. | |
530 | |a Also available in print. | ||
538 | |a Mode of access: World Wide Web. | ||
588 | |a Description based on title screen (IGI Global, viewed 02/09/2024). | ||
650 | 0 | |a Cloud computing |x Security measures. | |
650 | 0 | |a Computer networks |x Security measures. | |
650 | 0 | |a Computer security. | |
650 | 0 | |a Data protection. | |
653 | |a Cloud Access Control. | ||
653 | |a Cloud Compliance Frameworks. | ||
653 | |a Cloud Computing Security. | ||
653 | |a Cloud Data Governance. | ||
653 | |a Cloud Identity Management. | ||
653 | |a Cloud Incident Response. | ||
653 | |a Cloud Privacy Regulations. | ||
653 | |a Cloud Risk Management. | ||
653 | |a Cloud Security Best Practices. | ||
653 | |a Cloud Security Challenges. | ||
653 | |a Cloud Security Solutions. | ||
653 | |a Data Privacy in the Cloud. | ||
653 | |a Emerging Cloud Security Trends. | ||
653 | |a Encryption in Cloud. | ||
653 | |a Trust in Cloud Services. | ||
655 | 4 | |a Electronic books. | |
700 | 1 | |a Agarwal, Sanyam |d 1971- |e editor. | |
700 | 1 | |a Goel, Pawan Kumar |e editor. | |
700 | 1 | |a Pandey, Hari Mohan |e editor. | |
700 | 1 | |a Singhal, Amit |d 1979- |e editor. | |
710 | 2 | |a IGI Global, |e publisher. | |
776 | 0 | 8 | |i Print version: |z 9798369314319 |
966 | 4 | 0 | |l DE-862 |p ZDB-98-IGB |q FWS_PDA_IGB |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/979-8-3693-1431-9 |3 Volltext |
966 | 4 | 0 | |l DE-863 |p ZDB-98-IGB |q FWS_PDA_IGB |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/979-8-3693-1431-9 |3 Volltext |
912 | |a ZDB-98-IGB | ||
049 | |a DE-862 | ||
049 | |a DE-863 |
Record in the Search Index
DE-BY-FWS_katkey | ZDB-98-IGB-00328093 |
---|---|
_version_ | 1826942602505617408 |
adam_text | |
any_adam_object | |
author2 | Agarwal, Sanyam 1971- Goel, Pawan Kumar Pandey, Hari Mohan Singhal, Amit 1979- |
author2_role | edt edt edt edt |
author2_variant | s a sa p k g pk pkg h m p hm hmp a s as |
author_facet | Agarwal, Sanyam 1971- Goel, Pawan Kumar Pandey, Hari Mohan Singhal, Amit 1979- |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.585 .I47 2024e |
callnumber-search | QA76.585 .I47 2024e |
callnumber-sort | QA 276.585 I47 42024E |
callnumber-subject | QA - Mathematics |
collection | ZDB-98-IGB |
contents | Chapter 1. Securing cloud infrastructure in IaaS and PaaS environments -- Chapter 2. Impact of artificial intelligence and machine learning in cloud security -- Chapter 3. An intelligent data retrieving technique and safety measures for sustainable cloud computing -- Chapter 4. Enhancing cloud security: the role of artificial intelligence and machine learning -- Chapter 5. Role-based access control (RBAC) and attribute-based access control (ABAC) -- Chapter 6. Application of artificial intelligence in cybersecurity -- Chapter 7. Accountable malicious entity detection using re-encryption mechanism to share data -- Chapter 8. Balancing innovation and security in the cloud: navigating the risks and rewards of the digital age -- Chapter 9. Data storage and transmission security in the cloud: the artificial intelligence (AI) edge -- Chapter 10. Privacy and surveillance in digital era: a case for India -- Chapter 11. A model for trust decision, data analysis, and evaluation to identify quality web services. |
ctrlnum | (CaBNVSL)slc00005537 (OCoLC)1420825161 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04988nam a2200673 i 4500</leader><controlfield tag="001">ZDB-98-IGB-00328093</controlfield><controlfield tag="003">IGIG</controlfield><controlfield tag="005">20240209134413.0</controlfield><controlfield tag="006">m eo d </controlfield><controlfield tag="007">cr bn||||m|||a</controlfield><controlfield tag="008">240209s2024 pau fob 001 0 eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9798369314326</subfield><subfield code="q">PDF</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9798369314319</subfield><subfield code="q">print</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/979-8-3693-1431-9</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaBNVSL)slc00005537</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1420825161</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">CaBNVSL</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="c">CaBNVSL</subfield><subfield code="d">CaBNVSL</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.585</subfield><subfield code="b">.I47 2024e</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Improving security, privacy, and trust in cloud computing </subfield><subfield code="c">Pawan Kumar Goel, Hari Mohan Pandey, Amit Singhal, Sanyam Agarwal, editors.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) </subfield><subfield code="b">IGI Global</subfield><subfield code="c">2024.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">21 PDFs (299 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">electronic</subfield><subfield code="2">isbdmedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Chapter 1. Securing cloud infrastructure in IaaS and PaaS environments -- Chapter 2. Impact of artificial intelligence and machine learning in cloud security -- Chapter 3. An intelligent data retrieving technique and safety measures for sustainable cloud computing -- Chapter 4. Enhancing cloud security: the role of artificial intelligence and machine learning -- Chapter 5. Role-based access control (RBAC) and attribute-based access control (ABAC) -- Chapter 6. Application of artificial intelligence in cybersecurity -- Chapter 7. Accountable malicious entity detection using re-encryption mechanism to share data -- Chapter 8. Balancing innovation and security in the cloud: navigating the risks and rewards of the digital age -- Chapter 9. Data storage and transmission security in the cloud: the artificial intelligence (AI) edge -- Chapter 10. Privacy and surveillance in digital era: a case for India -- Chapter 11. A model for trust decision, data analysis, and evaluation to identify quality web services.</subfield></datafield><datafield tag="506" ind1=" " ind2=" "><subfield code="a">Restricted to subscribers or individual electronic text purchasers.</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">"Cloud computing adoption has revolutionized how businesses and individuals harness the power of technology. The cloud's scalability, accessibility, and cost-efficiency have propelled it to the forefront of modern computing paradigms. However, as organizations increasingly rely on cloud services to store, process, and manage their data and applications, an intricate web of challenges has emerged, casting shadows over the very foundations of cloud computing. Improving Security, Privacy, and Trust in Cloud Computing unravels the complexities surrounding the cloud landscape, delving into the core concerns of security, privacy, and trust that have come to define its evolution. It aims to equip readers with the insights, knowledge, and practical strategies needed to navigate the intricate realm of cloud computing while safeguarding their most valuable assets. This book's exploration into security, privacy, and trust in cloud computing takes a holistic approach. Throughout the chapters of this book, readers will embark on a multidimensional expedition. This book will take them through real-world case studies of successful cloud security implementations and unfortunate breaches that underscore the urgency of robust defenses. From data encryption techniques to incident response protocols, this book offers practical insights and actionable strategies that can be implemented by IT professionals, security experts, and decision-makers alike."--</subfield><subfield code="c">Provided by publisher.</subfield></datafield><datafield tag="530" ind1=" " ind2=" "><subfield code="a">Also available in print.</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: World Wide Web.</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on title screen (IGI Global, viewed 02/09/2024).</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cloud computing</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data protection.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cloud Access Control.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cloud Compliance Frameworks.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cloud Computing Security.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cloud Data Governance.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cloud Identity Management.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cloud Incident Response.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cloud Privacy Regulations.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cloud Risk Management.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cloud Security Best Practices.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cloud Security Challenges.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cloud Security Solutions.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Data Privacy in the Cloud.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Emerging Cloud Security Trends.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Encryption in Cloud.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Trust in Cloud Services.</subfield></datafield><datafield tag="655" ind1=" " ind2="4"><subfield code="a">Electronic books.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Agarwal, Sanyam</subfield><subfield code="d">1971-</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Goel, Pawan Kumar</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Pandey, Hari Mohan</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Singhal, Amit</subfield><subfield code="d">1979-</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">IGI Global,</subfield><subfield code="e">publisher.</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="z">9798369314319</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-862</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FWS_PDA_IGB</subfield><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/979-8-3693-1431-9</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-863</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FWS_PDA_IGB</subfield><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/979-8-3693-1431-9</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-862</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
genre | Electronic books. |
genre_facet | Electronic books. |
id | ZDB-98-IGB-00328093 |
illustrated | Not Illustrated |
indexdate | 2025-03-18T14:30:37Z |
institution | BVB |
isbn | 9798369314326 |
language | English |
oclc_num | 1420825161 |
open_access_boolean | |
owner | DE-862 DE-BY-FWS DE-863 DE-BY-FWS |
owner_facet | DE-862 DE-BY-FWS DE-863 DE-BY-FWS |
physical | 21 PDFs (299 Seiten) Also available in print. |
psigel | ZDB-98-IGB FWS_PDA_IGB ZDB-98-IGB |
publishDate | 2024 |
publishDateSearch | 2024 |
publishDateSort | 2024 |
publisher | IGI Global |
record_format | marc |
spelling | Improving security, privacy, and trust in cloud computing Pawan Kumar Goel, Hari Mohan Pandey, Amit Singhal, Sanyam Agarwal, editors. Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) IGI Global 2024. 21 PDFs (299 Seiten) text rdacontent electronic isbdmedia online resource rdacarrier Includes bibliographical references and index. Chapter 1. Securing cloud infrastructure in IaaS and PaaS environments -- Chapter 2. Impact of artificial intelligence and machine learning in cloud security -- Chapter 3. An intelligent data retrieving technique and safety measures for sustainable cloud computing -- Chapter 4. Enhancing cloud security: the role of artificial intelligence and machine learning -- Chapter 5. Role-based access control (RBAC) and attribute-based access control (ABAC) -- Chapter 6. Application of artificial intelligence in cybersecurity -- Chapter 7. Accountable malicious entity detection using re-encryption mechanism to share data -- Chapter 8. Balancing innovation and security in the cloud: navigating the risks and rewards of the digital age -- Chapter 9. Data storage and transmission security in the cloud: the artificial intelligence (AI) edge -- Chapter 10. Privacy and surveillance in digital era: a case for India -- Chapter 11. A model for trust decision, data analysis, and evaluation to identify quality web services. Restricted to subscribers or individual electronic text purchasers. "Cloud computing adoption has revolutionized how businesses and individuals harness the power of technology. The cloud's scalability, accessibility, and cost-efficiency have propelled it to the forefront of modern computing paradigms. However, as organizations increasingly rely on cloud services to store, process, and manage their data and applications, an intricate web of challenges has emerged, casting shadows over the very foundations of cloud computing. Improving Security, Privacy, and Trust in Cloud Computing unravels the complexities surrounding the cloud landscape, delving into the core concerns of security, privacy, and trust that have come to define its evolution. It aims to equip readers with the insights, knowledge, and practical strategies needed to navigate the intricate realm of cloud computing while safeguarding their most valuable assets. This book's exploration into security, privacy, and trust in cloud computing takes a holistic approach. Throughout the chapters of this book, readers will embark on a multidimensional expedition. This book will take them through real-world case studies of successful cloud security implementations and unfortunate breaches that underscore the urgency of robust defenses. From data encryption techniques to incident response protocols, this book offers practical insights and actionable strategies that can be implemented by IT professionals, security experts, and decision-makers alike."-- Provided by publisher. Also available in print. Mode of access: World Wide Web. Description based on title screen (IGI Global, viewed 02/09/2024). Cloud computing Security measures. Computer networks Security measures. Computer security. Data protection. Cloud Access Control. Cloud Compliance Frameworks. Cloud Computing Security. Cloud Data Governance. Cloud Identity Management. Cloud Incident Response. Cloud Privacy Regulations. Cloud Risk Management. Cloud Security Best Practices. Cloud Security Challenges. Cloud Security Solutions. Data Privacy in the Cloud. Emerging Cloud Security Trends. Encryption in Cloud. Trust in Cloud Services. Electronic books. Agarwal, Sanyam 1971- editor. Goel, Pawan Kumar editor. Pandey, Hari Mohan editor. Singhal, Amit 1979- editor. IGI Global, publisher. Print version: 9798369314319 |
spellingShingle | Improving security, privacy, and trust in cloud computing Chapter 1. Securing cloud infrastructure in IaaS and PaaS environments -- Chapter 2. Impact of artificial intelligence and machine learning in cloud security -- Chapter 3. An intelligent data retrieving technique and safety measures for sustainable cloud computing -- Chapter 4. Enhancing cloud security: the role of artificial intelligence and machine learning -- Chapter 5. Role-based access control (RBAC) and attribute-based access control (ABAC) -- Chapter 6. Application of artificial intelligence in cybersecurity -- Chapter 7. Accountable malicious entity detection using re-encryption mechanism to share data -- Chapter 8. Balancing innovation and security in the cloud: navigating the risks and rewards of the digital age -- Chapter 9. Data storage and transmission security in the cloud: the artificial intelligence (AI) edge -- Chapter 10. Privacy and surveillance in digital era: a case for India -- Chapter 11. A model for trust decision, data analysis, and evaluation to identify quality web services. Cloud computing Security measures. Computer networks Security measures. Computer security. Data protection. |
title | Improving security, privacy, and trust in cloud computing |
title_auth | Improving security, privacy, and trust in cloud computing |
title_exact_search | Improving security, privacy, and trust in cloud computing |
title_full | Improving security, privacy, and trust in cloud computing Pawan Kumar Goel, Hari Mohan Pandey, Amit Singhal, Sanyam Agarwal, editors. |
title_fullStr | Improving security, privacy, and trust in cloud computing Pawan Kumar Goel, Hari Mohan Pandey, Amit Singhal, Sanyam Agarwal, editors. |
title_full_unstemmed | Improving security, privacy, and trust in cloud computing Pawan Kumar Goel, Hari Mohan Pandey, Amit Singhal, Sanyam Agarwal, editors. |
title_short | Improving security, privacy, and trust in cloud computing |
title_sort | improving security privacy and trust in cloud computing |
topic | Cloud computing Security measures. Computer networks Security measures. Computer security. Data protection. |
topic_facet | Cloud computing Security measures. Computer networks Security measures. Computer security. Data protection. Electronic books. |
work_keys_str_mv | AT agarwalsanyam improvingsecurityprivacyandtrustincloudcomputing AT goelpawankumar improvingsecurityprivacyandtrustincloudcomputing AT pandeyharimohan improvingsecurityprivacyandtrustincloudcomputing AT singhalamit improvingsecurityprivacyandtrustincloudcomputing AT igiglobal improvingsecurityprivacyandtrustincloudcomputing |