Details

Title Advances in information security, privacy, and ethics (AISPE) book series. — Modern principles, practices, and algorithms for cloud security
Other creators Gupta Brij
Collection Электронные книги зарубежных издательств ; Общая коллекция
Subjects Cloud computing — Security measures. ; EBSCO eBooks
Document type Other
File type PDF
Language English
Rights Доступ по паролю из сети Интернет (чтение, печать, копирование)
Record key on1107142084
Record create date 6/13/2019

Allowed Actions

pdf/2264420.pdf
Action 'Read' will be available if you login or access site from another network Action 'Download' will be available if you login or access site from another network
epub/2264420.epub
Action 'Download' will be available if you login or access site from another network
Group Anonymous
Network Internet

"This book examines the principles, algorithms, applications, and practices of security in cloud computing"--.

Network User group Action
ILC SPbPU Local Network All
Read Print Download
Internet Authorized users SPbPU
Read Print Download
Internet Anonymous
  • Title Page
  • Copyright Page
  • Book Series
  • Dedication
  • Editorial Advisory Board
  • Table of Contents
  • Detailed Table of Contents
  • Preface
  • Acknowledgment
  • Chapter 1: Security- and Privacy-Aware Computing in Cloud With User Mobility
  • Chapter 2: Recent Advances Delivered in Mobile Cloud Computing's Security and Management Challenges
  • Chapter 3: Security for Cross-Tenant Access Control in Cloud Computing
  • Chapter 4: Secure Identity-Based Proxy Signature With Computational Diffie-Hellman for Cloud Data Management
  • Chapter 5: Cloud Computing Adoption
  • Chapter 6: A Computational Approach for Secure Cloud Computing Environments
  • Chapter 7: Security Threats and Recent Countermeasures in Cloud Computing
  • Chapter 8: A Framework Strategy to Overcome Trust Issues on Cloud Computing Adoption in Higher Education
  • Chapter 9: A Proposal of Improvement for Transmission Channels in Cloud Environments Using the CBEDE Methodology
  • Chapter 10: Meta-Heuristic and Non-Meta-Heuristic Energy-Efficient Load Balancing Algorithms in Cloud Computing
  • Chapter 11: Distributed Algorithms for Finding Meta-Paths of a Large Heterogeneous Information Network on Cloud
  • Chapter 12: A Tree Computing Block Chain Protocol Crypto-Signature Model
  • Chapter 13: Automate Model Transformation From CIM to PIM up to PSM in Model-Driven Architecture
  • Compilation of References
  • Related References
  • About the Contributors
  • Index
pdf/2264420.pdf

Access count: 0 
Last 30 days: 0

Detailed usage statistics

epub/2264420.epub

Access count: 0 
Last 30 days: 0

Detailed usage statistics