Data protection models for service provisioning in the cloud
Proceedings of the 15th ACM symposium on Access control models and technologies
Contract-based cloud architecture
CloudDB '10 Proceedings of the second international workshop on Cloud data management
Towards privacy-enhancing identity management in mashup-providing platforms
DBSec'10 Proceedings of the 24th annual IFIP WG 11.3 working conference on Data and applications security and privacy
iNetSec'10 Proceedings of the 2010 IFIP WG 11.4 international conference on Open research problems in network security
Journal of Management Information Systems
A Compartive Study of Cloud Computing Middleware
CCGRID '12 Proceedings of the 2012 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (ccgrid 2012)
Failure-aware resource provisioning for hybrid Cloud infrastructure
Journal of Parallel and Distributed Computing
Cloud Computing Security: Opportunities and Pitfalls
International Journal of Grid and High Performance Computing
Journal of Management Information Systems
Future Generation Computer Systems
Information and Software Technology
Privacy-preserving identity federations in the cloud: a proof of concept
International Journal of Security and Networks
Hi-index | 0.00 |
This book, written by recognized authorities in the tech security world, addresses issues that affect any organization preparing to use cloud computing as an option. Cloud computing has emerged as a popular way for corporations to save money that would otherwise go into their IT infrastructure. However, along with the promise of cloud computing there has also been considerable skepticism about the type and extent of security and privacy that these services provide. Cloud Security and Privacy walks you through the steps you need to take to ensure your web applications are secure and your data is safe, and addresses regulatory issues such as audit and compliance. Ideal for IT personnel who need to deliver and maintain applications in the cloud, business managers looking to cut costs, service providers, and investors, this book provides the detailed information on cloud computing security that has been lacking, until now.