LEADER 05271nam 22007695 450 001 9910437570703321 005 20200630171720.0 010 $a1-283-62205-X 010 $a9786613934505 010 $a1-4471-4189-X 024 7 $a10.1007/978-1-4471-4189-1 035 $a(CKB)2670000000256862 035 $a(EBL)994269 035 $a(OCoLC)809543567 035 $a(SSID)ssj0000746092 035 $a(PQKBManifestationID)11930882 035 $a(PQKBTitleCode)TC0000746092 035 $a(PQKBWorkID)10878134 035 $a(PQKB)11690758 035 $a(DE-He213)978-1-4471-4189-1 035 $a(MiAaPQ)EBC994269 035 $a(PPN)168292866 035 $a(EXLCZ)992670000000256862 100 $a20120827d2013 u| 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aPrivacy and Security for Cloud Computing$b[electronic resource] /$fedited by Siani Pearson, George Yee 205 $a1st ed. 2013. 210 1$aLondon :$cSpringer London :$cImprint: Springer,$d2013. 215 $a1 online resource (312 p.) 225 1 $aComputer Communications and Networks,$x1617-7975 300 $aDescription based upon print version of record. 311 $a1-4471-5793-1 311 $a1-4471-4188-1 320 $aIncludes bibliographical references (p. 288-291) and index. 327 $aPart I: Introduction to the Issues -- Privacy, Security and Trust in Cloud Computing -- Part II: Law Enforcement and Audits -- Accessing Data in the Cloud: The Long Arm of the Law Enforcement Agent -- A Privacy Impact Assessment Tool for Cloud Computing -- Understanding Cloud Audits -- Part III: Security and Integrity -- Security Infrastructure for Dynamically Provisioned Cloud Infrastructure Services -- Modeling the Runtime Integrity of Cloud Servers: a Scoped Invariant Perspective -- Part IV: Risk Considerations -- Inadequacies of Current Risk Controls for the Cloud -- Enterprise Information Risk Management: Dealing with Cloud Computing. 330 $aDespite the enormous potential of cloud computing, consumer uncertainty and concern regarding issues of privacy, security and trust remain a major barrier to the switch to cloud models. This comprehensive and authoritative text/reference provides an in-depth analysis of the latest advances in privacy, security and risk technologies within cloud environments. Containing contributions from leading experts in the field, the text presents both a thorough introduction to the core issues, and a practical selection of innovative solutions to common problems. A Glossary is also included at the end of the book. Topics and features: Considers the various forensic challenges for legal access to data in a cloud computing environment Discusses privacy impact assessments for the cloud, and examines the use of cloud audits to attenuate cloud security problems Reviews conceptual issues, basic requirements and practical suggestions for provisioning dynamically configured access control services in the cloud Proposes scoped invariants as a primitive for analyzing a cloud server for its integrity properties Investigates the applicability of existing controls for mitigating information security risks to cloud computing environments Describes risk management for cloud computing from an enterprise perspective This pioneering volume is essential reading for business professionals, students and researchers interested in the field of privacy and security protection for the cloud, and/or complex service provisioning. Newcomers to these areas will benefit from the solid overview of the field, whereas established experts will value the novel, cutting-edge research described in the work. 410 0$aComputer Communications and Networks,$x1617-7975 606 $aArchitecture, Computer 606 $aComputer system failures 606 $aComputer software?Reusability 606 $aManagement information systems 606 $aComputer science 606 $aComputer System Implementation$3https://scigraph.springernature.com/ontologies/product-market-codes/I13057 606 $aSystem Performance and Evaluation$3https://scigraph.springernature.com/ontologies/product-market-codes/I13049 606 $aPerformance and Reliability$3https://scigraph.springernature.com/ontologies/product-market-codes/I12077 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 615 0$aArchitecture, Computer. 615 0$aComputer system failures. 615 0$aComputer software?Reusability. 615 0$aManagement information systems. 615 0$aComputer science. 615 14$aComputer System Implementation. 615 24$aSystem Performance and Evaluation. 615 24$aPerformance and Reliability. 615 24$aManagement of Computing and Information Systems. 676 $a004.67/82 676 $a004.6782 702 $aPearson$b Siani$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aYee$b George$4edt$4http://id.loc.gov/vocabulary/relators/edt 906 $aBOOK 912 $a9910437570703321 996 $aPrivacy and Security for Cloud Computing$92499220 997 $aUNINA