SULJE VALIKKO

avaa valikko

Pierangela Samarati | Akateeminen Kirjakauppa

Haullasi löytyi yhteensä 28 tuotetta
Haluatko tarkentaa hakukriteerejä?



Secure Cloud Computing
Sushil Jajodia; Krishna Kant; Pierangela Samarati; Anoop Singhal; Vipin Swarup; Cliff Wang
Springer-Verlag New York Inc. (2016)
Pehmeäkantinen kirja
107,50
Tuotetta lisätty
ostoskoriin kpl
Siirry koriin
Public Key Infrastructure - 4th European PKI Workshop: Theory and Practice, EuroPKI 2007, Palma de Mallorca, Spain, June 28-30,
Pierangela Samarati; Josep L. Ferrer
Springer-Verlag Berlin and Heidelberg GmbH & Co. KG (2007)
Pehmeäkantinen kirja
49,60
Tuotetta lisätty
ostoskoriin kpl
Siirry koriin
Computer Security - ESORICS 2004 : 9th European Symposium on Research Computer Security, Sophia Antipolis, France, September 13-
Pierangela Samarati (ed.); Peter Ryan (ed.); Dieter Gollmann (ed.); Refik Molva (ed.)
Springer (2004)
Pehmeäkantinen kirja
49,60
Tuotetta lisätty
ostoskoriin kpl
Siirry koriin
Database Security X - Status and prospects
Pierangela Samarati; Ravi Sandhu
Chapman and Hall (1997)
Kovakantinen kirja
129,90
Tuotetta lisätty
ostoskoriin kpl
Siirry koriin
Information Security - 12th International Conference, ISC 2009 Pisa, Italy, September 7-9, 2009 Proceedings
Pierangela Samarati; Moti Yung; Fabio Martinelli; Claudio Agostino Ardagna
Springer-Verlag Berlin and Heidelberg GmbH & Co. KG (2009)
Pehmeäkantinen kirja
97,90
Tuotetta lisätty
ostoskoriin kpl
Siirry koriin
Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices - 4th IFIP WG 11.2 Intern
Pierangela Samarati; Michael Tunstall; Joachim Posegga; Konstantinos Markantonakis; Damien Sauveron
Springer-Verlag Berlin and Heidelberg GmbH & Co. KG (2010)
Pehmeäkantinen kirja
49,60
Tuotetta lisätty
ostoskoriin kpl
Siirry koriin
Data and Applications Security and Privacy XXIX - 29th Annual IFIP WG 11.3 Working Conference, DBSec 2015, Fairfax, VA, USA, Jul
Pierangela Samarati
Springer International Publishing AG (2015)
Pehmeäkantinen kirja
49,60
Tuotetta lisätty
ostoskoriin kpl
Siirry koriin
From Database to Cyber Security - Essays Dedicated to Sushil Jajodia on the Occasion of His 70th Birthday
Pierangela Samarati; Indrajit Ray; Indrakshi Ray
Springer Nature Switzerland AG (2018)
Pehmeäkantinen kirja
49,60
Tuotetta lisätty
ostoskoriin kpl
Siirry koriin
E-Business and Telecommunications : 18th International Conference, ICETE 2021, Virtual Event, July 6–9, 2021, Revised Selected P
Pierangela Samarati (ed.); Marten van Sinderen (ed.); Sabrina De Capitani di Vimercati (ed.); Fons Wijnhoven (ed.)
Springer (2023)
Pehmeäkantinen kirja
78,60
Tuotetta lisätty
ostoskoriin kpl
Siirry koriin
Security and Privacy in the Age of Uncertainty - IFIP TC11 18th International Conference on Information Security (SEC2003) May 2
Sabrina de Capitani di Vimercati; Pierangela Samarati; Sokratis Katsikas
Springer-Verlag New York Inc. (2003)
Kovakantinen kirja
97,90
Tuotetta lisätty
ostoskoriin kpl
Siirry koriin
Security of Data and Transaction Processing : A Special Issue of Distributed and Parallel Databases Volume 8, No. 1 (2000)
Vijay Atluri (ed.); Pierangela Samarati (ed.)
Springer (2000)
Kovakantinen kirja
97,90
Tuotetta lisätty
ostoskoriin kpl
Siirry koriin
Research Directions in Data and Applications Security XVIII - IFIP TC11 / WG11.3 Eighteenth Annual Conference on Data and Applic
Csilla Farkas; Pierangela Samarati
Springer-Verlag New York Inc. (2004)
Kovakantinen kirja
97,90
Tuotetta lisätty
ostoskoriin kpl
Siirry koriin
Proceedings of the IFIP TC 11 23rd International Information Security Conference : IFIP 20th World Computer Congress, IFIP SEC'0
Sushil Jajodia (ed.); Pierangela Samarati (ed.); Stelvio Cimato (ed.)
Springer (2008)
Kovakantinen kirja
129,90
Tuotetta lisätty
ostoskoriin kpl
Siirry koriin
Privacy in Location-Based Applications - Research Issues and Emerging Trends
Claudio Bettini; Sushil Jajodia; Pierangela Samarati; Sean X. Wang
Springer-Verlag Berlin and Heidelberg GmbH & Co. KG (2009)
Pehmeäkantinen kirja
49,60
Tuotetta lisätty
ostoskoriin kpl
Siirry koriin
Proceedings of the IFIP TC 11 23rd International Information Security Conference : IFIP 20th World Computer Congress, IFIP SEC'0
Sushil Jajodia (ed.); Pierangela Samarati (ed.); Stelvio Cimato (ed.)
Springer (2010)
Pehmeäkantinen kirja
129,90
Tuotetta lisätty
ostoskoriin kpl
Siirry koriin
Applied Cryptography and Network Security - 10th International Conference, ACNS 2012, Singapore, June 26-29, 2012, Proceedings
Feng Bao; Pierangela Samarati; Jianying Zhou
Springer-Verlag Berlin and Heidelberg GmbH & Co. KG (2012)
Pehmeäkantinen kirja
49,60
Tuotetta lisätty
ostoskoriin kpl
Siirry koriin
Security of Data and Transaction Processing : A Special Issue of Distributed and Parallel Databases Volume 8, No. 1 (2000)
Vijay Atluri (ed.); Pierangela Samarati (ed.)
Springer (2012)
Pehmeäkantinen kirja
97,90
Tuotetta lisätty
ostoskoriin kpl
Siirry koriin
Security and Trust Management - 8th International Workshop, STM 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Paper
Audun Jøsang; Pierangela Samarati; Marinella Petrocchi
Springer-Verlag Berlin and Heidelberg GmbH & Co. KG (2013)
Pehmeäkantinen kirja
49,60
Tuotetta lisätty
ostoskoriin kpl
Siirry koriin
Secure Cloud Computing
Sushil Jajodia; Krishna Kant; Pierangela Samarati; Anoop Singhal; Vipin Swarup; Cliff Wang
Springer-Verlag New York Inc. (2014)
Kovakantinen kirja
97,90
Tuotetta lisätty
ostoskoriin kpl
Siirry koriin
Research Directions in Data and Applications Security XVIII : IFIP TC11 / WG11.3 Eighteenth Annual Conference on Data and Applic
Csilla Farkas (ed.); Pierangela Samarati (ed.)
Springer (2013)
Pehmeäkantinen kirja
97,90
Tuotetta lisätty
ostoskoriin kpl
Siirry koriin
Springer-Verlag New York Inc.
Sivumäärä: 343 sivua
Asu: Pehmeäkantinen kirja
Painos: Softcover reprint of
Julkaisuvuosi: 2016, 27.08.2016 (lisätietoa)
Kieli: Englanti
This book presents a range of cloud computing security challenges and promising solution paths. The first two chapters focus on practical considerations of cloud computing. In Chapter 1, Chandramouli, Iorga, and Chokani describe the evolution of cloud computing and the current state of practice, followed by the challenges of cryptographic key management in the cloud. In Chapter 2, Chen and Sion present a dollar cost model of cloud computing and explore the economic viability of cloud computing with and without security mechanisms involving cryptographic mechanisms. The next two chapters address security issues of the cloud infrastructure. In Chapter 3, Szefer and Lee describe a hardware-enhanced security architecture that protects the confidentiality and integrity of a virtual machine’s memory from an untrusted or malicious hypervisor. In Chapter 4, Tsugawa et al. discuss the security issues introduced when Software-Defined Networking (SDN) is deployed within and across clouds. Chapters 5-9 focus on the protection of data stored in the cloud. In Chapter 5, Wang et al. present two storage isolation schemes that enable cloud users with high security requirements to verify that their disk storage is isolated from some or all other users, without any cooperation from cloud service providers. In Chapter 6, De Capitani di Vimercati, Foresti, and Samarati describe emerging approaches for protecting data stored externally and for enforcing fine-grained and selective accesses on them, and illustrate how the combination of these approaches can introduce new privacy risks. In Chapter 7, Le, Kant, and Jajodia explore data access challenges in collaborative enterprise computing environments where multiple parties formulate their own authorization rules, and discuss the problems of rule consistency, enforcement, and dynamic updates. In Chapter 8, Smith et al. address key challenges to the practical realization of a system that supports query execution over remote encrypted data without exposing decryption keys or plaintext at the server. In Chapter 9, Sun et al. provide an overview of secure search techniques over encrypted data, and then elaborate on a scheme that can achieve privacy-preserving multi-keyword text search. The next three chapters focus on the secure deployment of computations to the cloud. In Chapter 10, Oktay el al. present a risk-based approach for workload partitioning in hybrid clouds that selectively outsources data and computation based on their level of sensitivity. The chapter also describes a vulnerability assessment framework for cloud computing environments. In Chapter 11, Albanese et al. present a solution for deploying a mission in the cloud while minimizing the mission’s exposure to known vulnerabilities, and a cost-effective approach to harden the computational resources selected to support the mission. In Chapter 12, Kontaxis et al. describe a system that generates computational decoys to introduce uncertainty and deceive adversaries as to which data and computation is legitimate. The last section of the book addresses issues related to security monitoring and system resilience. In Chapter 13, Zhou presents a secure, provenance-based capability that captures dependencies between system states, tracks state changes over time, and that answers attribution questions about the existence, or change, of a system’s state at a given time. In Chapter 14, Wu et al. present a monitoring capability for multicore architectures that runs monitoring threads concurrently with user or kernel code to constantly check for security violations. Finally, in Chapter 15, Hasan Cam describes how to manage the risk and resilience of cyber-physical systems by employing controllability and observability techniques for linear and non-linear systems.

Tuotetta lisätty
ostoskoriin kpl
Siirry koriin
LISÄÄ OSTOSKORIIN
Tilaustuote | Arvioimme, että tuote lähetetään meiltä noin 5-6 viikossa. Tilaa tuote jouluksi viimeistään 13.11.2024
Myymäläsaatavuus
Helsinki
Tapiola
Turku
Tampere
Secure Cloud Computingzoom
Näytä kaikki tuotetiedot
ISBN:
9781493948833
Sisäänkirjautuminen
Kirjaudu sisään
Rekisteröityminen
Oma tili
Omat tiedot
Omat tilaukset
Omat laskut
Lisätietoja
Asiakaspalvelu
Tietoa verkkokaupasta
Toimitusehdot
Tietosuojaseloste