Guide to security assurance for cloud computing
Book
Zhu, Shao Ying, Hill, Richard and Trovati, Marcello 2015. Guide to security assurance for cloud computing. Springer.
Authors | Zhu, Shao Ying, Hill, Richard and Trovati, Marcello |
---|---|
Abstract | This practical and didactic text/reference discusses the leading edge of secure cloud computing, exploring the essential concepts and principles, tools, techniques and deployment models in this field. Enlightening perspectives are presented by an international collection of pre-eminent authorities in cloud security assurance from both academia and industry. |
Keywords | Cloud computing; Security |
ISBN | 978-3-319-25988-8 |
Web address (URL) | http://hdl.handle.net/10545/620923 |
hdl:10545/620923 | |
File | File Access Level Open |
Publication dates | 2015 |
Publication process dates | |
Deposited | 21 Nov 2016, 12:11 |
Year | 2015 |
Publisher | Springer |
Contributors | University of Derby |
Permalink -
https://repository.derby.ac.uk/item/9462w/guide-to-security-assurance-for-cloud-computing
Download files
37
total views0
total downloads1
views this month0
downloads this month
Export as
Related outputs

A framework for orchestrating secure and dynamic access of IoT services in multi-cloud environments.
Kazim, M., Liu, Lu, Zhu, Shao Ying and Zheng, Yongjun 2018. A framework for orchestrating secure and dynamic access of IoT services in multi-cloud environments. IEEE Access. https://doi.org/10.1109/ACCESS.2018.2873812A framework for orchestrating secure and dynamic access of IoT services in multi-cloud environments
Liu, Lu, Zhu, Shao Ying and Kazim, M. 2018. A framework for orchestrating secure and dynamic access of IoT services in multi-cloud environments. IEEE Access. https://doi.org/10.1109/ACCESS.2018.2873812
Big-Data analytics and cloud computing: Theory, algorithms and applications
Hill, Richard, Trovati, Marcello, Liu, Lu, Anjum, Ashiq and Zhu, Shao Ying 2015. Big-Data analytics and cloud computing: Theory, algorithms and applications. Springer.
Analysis of HEp-2 images using MD-LBP and MAD-bagging
Schaefer, Gerald, Doshi, Niraj P., Zhu, Shao Ying and Hu, Qinghua 2014. Analysis of HEp-2 images using MD-LBP and MAD-bagging. IEEE. https://doi.org/10.1109/EMBC.2014.6944562
A comparison of OSPFv3 and EIGRPv6 in a small IPv6 enterprise network
Whitfield, Richard and Zhu, Shao Ying 2015. A comparison of OSPFv3 and EIGRPv6 in a small IPv6 enterprise network. International Journal of Advanced Computer Science and Applications (IJACSA). https://doi.org/10.14569/IJACSA.2015.060123
A review of solutions for SDN-Exclusive security issues
Spooner, Jakob and Zhu, Shao Ying 2016. A review of solutions for SDN-Exclusive security issues. International Journal of Advanced Computer Science and Applications (IJACSA). https://doi.org/10.14569/IJACSA.2016.070817