LEADER 01099nam0-2200373---450- 001 990000052440403321 005 20070206113531.0 035 $a000005244 035 $aFED01000005244 035 $a(Aleph)000005244FED01 035 $a000005244 100 $a20020821d1950----km-y0itay50------ba 101 0 $aita 102 $aIT 105 $aa-------001yy 200 1 $aAerodinamica applicata al volo$egeneralità sui fluidi e sul loro movimento ...$fGian Battista Nicolò$gprefazione di A. Eula 210 $aRoma$cAssociazione culturale aeronautica$d1950 215 $a333 p.$cill.$d23 cm 610 0 $aAerodinamica$aApplicazioni 610 0 $aVolo$aAerodinamica 676 $a629.1341 676 $a533.62 700 1$aNicolò,$bGian Battista$0331343 702 1$aEula,$bAntonio 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990000052440403321 952 $a13 F 02 07$b19486$fFINBC 952 $a13 X 47$b27482$fFINBC 952 $aB 126$fDINPA 959 $aFINBC 959 $aDINPA 996 $aAerodinamica applicata al volo$9112039 997 $aUNINA LEADER 05008nam 2200709Ia 450 001 9910219982603321 005 20200520144314.0 010 $a1-280-12694-9 010 $a9786613530806 010 $a0-8330-5960-2 035 $a(CKB)2550000000074430 035 $a(EBL)825129 035 $a(OCoLC)780425716 035 $a(SSID)ssj0000671945 035 $a(PQKBManifestationID)11428724 035 $a(PQKBTitleCode)TC0000671945 035 $a(PQKBWorkID)10633978 035 $a(PQKB)10207246 035 $a(Au-PeEL)EBL825129 035 $a(CaPaEBR)ebr10516122 035 $a(MiAaPQ)EBC825129 035 $a(oapen)doab114972 035 $a(EXLCZ)992550000000074430 100 $a20111211d2011 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 14$aThe Cloud $eunderstanding the security, privacy and trust challenges /$fNeil Robinson, ... [et al.] 205 $a1st ed. 210 $aSanta Monica $cRand$d2011 215 $a1 online resource (135 p.) 225 1 $aTechnical report ;$v[TR-933-EC] 300 $a"Sponsored by the European Commission Directorate General Information Society and Media". 320 $aIncludes bibliographical references. 327 $aCover; Title Page; Copyright; Preface; Acknowledgements; Contents; Glossary; Executive Summary; Synthesis; Defining cloud computing; Defining security, privacy and trust; Issues arising from the reviewed literature; Risk control frameworks; Operational challenges; Implications from case studies; Gap analysis; Solving the challenges: observations and recommendations; Conclusions; Methodology; Structure of the report; Chapter 1:Introduction; Chapter 2: Definitions and drivers; 2.1 Definitions of cloud computing; 2.2 What's pushing cloud take-up? 327 $a2.3 The economics of cloud computing: implications for security; 2.4 Concluding remarks; Chapter 3: Understanding the implications for security, privacy and trust; 3.1 Defining security, privacy and trust; 3.2 Growing focus on security, privacy and trust concerns; 3.3 Identifying key issues and possible enablers for security, trust and privacy in the cloud; Chapter 4: Security, privacy and trust challenges stemming from the technological underpinnings of cloud computing; 4.1 The linchpin of trust: the hypervisor 327 $a4.2 Can the distributed models of computation characteristic of grid technology adequately serve the availability and interoperability needs of cloud computing?; 4.3 Current state-of-the-art web services may not be sufficient to establish interoperability for identity management in the cloud; 4.4 Trustworthiness in service-orientated architectures (SOAs); 4.5 Will web application frameworks (APIs and SDKs) be credible in providing trust across distributed environments?; 4.6 The fragility of current encryption approaches in the cloud context; 4.7 Concluding remarks 327 $aChapter 5: Security, privacy and trust challenges inherent to the legal and regulatory aspects of cloud computing; 5.1 Horizontal perspective: applicable law and jurisdiction; 5.2 Vertical issues: main applicable laws; 5.3 The will of the parties: contractual provisions; 5.4 Overcoming legal barriers: key tools; 5.5 Concluding remarks; Chapter 6: Putting it all together: key risks and operational challenges; 6.1 Summary of legal and technical issues; 6.2 Migrating to the cloud: the operational challenges; Chapter 7: Case studies; 7.1 Introduction; 7.2 Initial classification of case studies 327 $a7.3 Observations on case studies in practice; 7.4 Matrix of case study typology; 7.5 Case Study 1: the Danish National IT and Telecom Agency; 7.6 Case study 2: the City of Los Angeles; 7.7 Case study 3: EU eHealth provider; 7.8 Implications; Chapter 8: Gap analysis; Chapter 9: Solving the challenges: recommendations and actions; 9.1 Introduction; 9.2 Recommendations; 9.3 Specific actions; Chapter 10: Conclusions; References; Appendices 330 $aThis report discusses how policy-makers might address the challenges and risks in respect of the security, privacy and trust aspects of cloud computing that could undermine the attainment of broader economic and societal objectives across Europe. 410 0$aTechnical report (Rand Corporation) ;$vTR-933-EC. 606 $aCloud computing$xSecurity measures 606 $aComputer security 606 $aPrivacy, Right of 606 $aInformation policy$zEuropean Union countries 615 0$aCloud computing$xSecurity measures. 615 0$aComputer security. 615 0$aPrivacy, Right of. 615 0$aInformation policy 676 $a342.40858 700 $aRobinson$b Neil$f1964-$01041680 712 02$aRand Corporation. 712 02$aEuropean Commission.$bInformation Society DG. 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910219982603321 996 $aThe Cloud$92484873 997 $aUNINA LEADER 01157nam0 22002891i 450 001 UON00392364 005 20231205104618.454 010 $a978-88-548-2635-9 100 $a20110509d2009 |0itac50 ba 101 $aita 102 $aIT 105 $a|||| ||||| 200 1 $aMutamento del sistema-mondo$eper una geografia dell'ascesa cinese$fFabio Massimo Parenti$gprefazione di Claudio Cerreti 210 $aRoma$cAracne$d2009 215 $a154 p.$cill.$d24 cm. 410 1$1001UON00393997$12001 $aA14$v224 606 $aCina$xGeografia economica$3UONC010340$2FI 620 $aIT$dRoma$3UONL000004 700 1$aParenti$bFabio Massimo$3UONV153638$0498304 702 1$aCerretti$bClaudio$3UONV003995 712 $aAracne$3UONV270475$4650 801 $aIT$bSOL$c20251205$gRICA 899 $aSIBA - SISTEMA BIBLIOTECARIO DI ATENEO E ARCHIVIO STORICO$2UONSI 912 $aUON00392364 950 $aSIBA - SISTEMA BIBLIOTECARIO DI ATENEO E ARCHIVIO STORICO$dSI VII GEO 2.0 1033 $eSI SC 47048 5 1033 $sBuono 996 $aMutamento del sistema-mondo$91349750 997 $aUNIOR