03622nam 2200505 450 99646534700331620220206173305.03-030-31729-310.1007/978-3-030-31729-4(CKB)5590000000002314(MiAaPQ)EBC6361031(DE-He213)978-3-030-31729-4(MiAaPQ)EBC6644956(Au-PeEL)EBL6361031(OCoLC)1198558318(Au-PeEL)EBL6644956(PPN)250222531(EXLCZ)99559000000000231420220206d2020 uy 0engurnn|008mamaatxtrdacontentcrdamediacrrdacarrierAccess control management in cloud environments /Hua Wang, Jinli Cao, Yanchun Zhang1st ed. 2020.Cham, Switzerland :Springer,[2020]©20201 online resource (XVII, 300 p. 61 illus.) 3-030-31728-5 1. Introduction -- 2. Electronic Commerce Items and Related Technology -- 3. Untraceable electronic cash system in the Internet of Things -- 4. Achieving secure and flxible M-services through tickets -- 5. A self-scalable anonymity payment approach in cloud environment -- 6. Using RBAC to secure payment process in cloud -- 7 Role-Based Access Control Constraints and Object Constraint Language -- 8. Role-based delegation with negative authorization -- 9. Access control management for ubiquitous computing -- 10. Trust-based access control management in collaborative open social networks -- 11. Building access control policy model for privacy preserving and testing policy conflicting problems -- 12. Effective collaboration with information sharing in virtual universities -- 13 Distributed access control through Blockchain technology.This textbook introduces new business concepts on cloud environments such as secure, scalable anonymity and practical payment protocols for the Internet of things and Blockchain technology. The protocol uses electronic cash for payment transactions. In this new protocol, from the viewpoint of banks, consumers can improve anonymity if they are worried about disclosure of their identities in the cloud. Currently, there is not a book available that has reported the techniques covering the protocols with anonymizations and Blockchain technology. Thus this will be a useful book for universities to purchase. This textbook provides new direction for access control management and online business, with new challenges within Blockchain technology that may arise in cloud environments. One is related to the authorization granting process. For example, when a role is granted to a user, this role may conflict with other roles of the user or together with this role; the user may have or derive a high level of authority. Another is related to authorization revocation. For instance, when a role is revoked from a user, the user may still have the role. Experts will get benefits from these challenges through the developed methodology for authorization granting algorithm, and weak revocation and strong revocation algorithms.Cloud computingSecurity measuresCloud computingSecurity measures.004.6782Wang Hua851626Cao JinliZhang YanchunMiAaPQMiAaPQMiAaPQBOOK996465347003316Access Control Management in Cloud Environments1901519UNISA04440oam 22011894 450 991016503580332120250426110500.09781475576283147557628597814755763201475576323(CKB)3710000001064751(MiAaPQ)EBC4807097(IMF)1GRCEA20170031GRCEA2017003(EXLCZ)99371000000106475120020129d2017 uf 0engurcnu||||||||rdacontentrdamediardacarrierGreece : Ex-Post Evaluation of Exceptional Access Under the 2012 Extended Arrangement-Press Release; Staff Report;and Statement by the Executive Director for GreeceWashington, D.C. :International Monetary Fund,2017.1 online resource (77 pages) illustrations (some color), tables, graphsIMF Staff Country Reports9781475576252 1475576250 Includes bibliographical references.This paper discusses Greece’s Ex Post Evaluation of Exceptional Access Under the 2012 Extended Arrangement. Greece has made significant progress in unwinding its macroeconomic imbalances since the onset of its financial crisis. However, extensive fiscal consolidation and internal devaluation have come at a high cost to society, reflected in declining incomes and exceptionally high unemployment. On the basis of Greece’s current policy adjustment program, long-term growth is expected to reach slightly lower than 1 percent, and the primary fiscal surplus is projected to come in at about 1.5 percent of GDP. Downside risks to the macroeconomic and fiscal outlook remain significant, related to incomplete or delayed policy implementation.IMF Staff Country Reports; Country Report ;No. 2017/044Banks and BankingimfExports and ImportsimfFinancial Risk ManagementimfMacroeconomicsimfPublic FinanceimfDebtimfDebt ManagementimfSovereign DebtimfFiscal PolicyimfInstitutions and the MacroeconomyimfBanksimfDepository InstitutionsimfMicro Finance InstitutionsimfMortgagesimfInternational Lending and Debt ProblemsimfPublic finance & taxationimfFinanceimfBankingimfInternational economicsimfPublic debtimfFiscal consolidationimfDebt reliefimfStructural reformsimfFiscal policyimfAsset and liability managementimfMacrostructural analysisimfDebt sustainabilityimfExternal debtimfDebts, PublicimfDebts, ExternalimfBanks and bankingimfGreeceGuidebooksGreeceDescription and travelGreeceimfBanks and BankingExports and ImportsFinancial Risk ManagementMacroeconomicsPublic FinanceDebtDebt ManagementSovereign DebtFiscal PolicyInstitutions and the MacroeconomyBanksDepository InstitutionsMicro Finance InstitutionsMortgagesInternational Lending and Debt ProblemsPublic finance & taxationFinanceBankingInternational economicsPublic debtFiscal consolidationDebt reliefStructural reformsFiscal policyAsset and liability managementMacrostructural analysisDebt sustainabilityExternal debtDebts, PublicDebts, ExternalBanks and banking914.950476DcWaIMFBOOK9910165035803321GREECE112492UNINA