Guide to security assurance for cloud computing

Book


Zhu, Shao Ying, Hill, Richard and Trovati, Marcello 2015. Guide to security assurance for cloud computing. Springer.
AuthorsZhu, Shao Ying, Hill, Richard and Trovati, Marcello
Abstract

This practical and didactic text/reference discusses the leading edge of secure cloud computing, exploring the essential concepts and principles, tools, techniques and deployment models in this field. Enlightening perspectives are presented by an international collection of pre-eminent authorities in cloud security assurance from both academia and industry.

KeywordsCloud computing; Security
ISBN978-3-319-25988-8
Web address (URL)http://hdl.handle.net/10545/620923
hdl:10545/620923
File
File Access Level
Open
Publication dates2015
Publication process dates
Deposited21 Nov 2016, 12:11
Year2015
PublisherSpringer
ContributorsUniversity of Derby
Permalink -

https://repository.derby.ac.uk/item/9462w/guide-to-security-assurance-for-cloud-computing

Download files


File
license.txt
File access level: Open

  • 28
    total views
  • 0
    total downloads
  • 1
    views this month
  • 0
    downloads this month

Export as

Related outputs

A framework for orchestrating secure and dynamic access of IoT services in multi-cloud environments.
Kazim, M., Liu, Lu, Zhu, Shao Ying and Zheng, Yongjun 2018. A framework for orchestrating secure and dynamic access of IoT services in multi-cloud environments. IEEE Access. https://doi.org/10.1109/ACCESS.2018.2873812
A framework for orchestrating secure and dynamic access of IoT services in multi-cloud environments
Liu, Lu, Zhu, Shao Ying and Kazim, M. 2018. A framework for orchestrating secure and dynamic access of IoT services in multi-cloud environments. IEEE Access. https://doi.org/10.1109/ACCESS.2018.2873812
Big-Data analytics and cloud computing: Theory, algorithms and applications
Hill, Richard, Trovati, Marcello, Liu, Lu, Anjum, Ashiq and Zhu, Shao Ying 2015. Big-Data analytics and cloud computing: Theory, algorithms and applications. Springer.
Analysis of HEp-2 images using MD-LBP and MAD-bagging
Schaefer, Gerald, Doshi, Niraj P., Zhu, Shao Ying and Hu, Qinghua 2014. Analysis of HEp-2 images using MD-LBP and MAD-bagging. IEEE. https://doi.org/10.1109/EMBC.2014.6944562
A comparison of OSPFv3 and EIGRPv6 in a small IPv6 enterprise network
Whitfield, Richard and Zhu, Shao Ying 2015. A comparison of OSPFv3 and EIGRPv6 in a small IPv6 enterprise network. International Journal of Advanced Computer Science and Applications (IJACSA). https://doi.org/10.14569/IJACSA.2015.060123
A review of solutions for SDN-Exclusive security issues
Spooner, Jakob and Zhu, Shao Ying 2016. A review of solutions for SDN-Exclusive security issues. International Journal of Advanced Computer Science and Applications (IJACSA). https://doi.org/10.14569/IJACSA.2016.070817
A survey on top security threats in cloud computing
Kazim, M. and Zhu, Shao Ying 2015. A survey on top security threats in cloud computing. International Journal of Advanced Computer Science and Applications (IJACSA). https://doi.org/10.14569/IJACSA.2015.060316#sthash.hDOJaK6L.dpuf