Home Page Icon
Home Page
Table of Contents for
Title Page
Close
Title Page
by John R. Vacca
Cloud Computing Security
Cover
Half Title
Title Page
Copyright Page
Dedication
Table of Contents
Foreword
Preface
Acknowledgments
The Editor
Contributors
SECTION I Introduction
CHAPTER 1 ■ Cloud Computing Essentials
CHAPTER 2 ■ Overview of Cloud Computing
CHAPTER 3 ■ Cloud Security Baselines
CHAPTER 4 ■ Cloud Security, Privacy, and Trust Baselines
CHAPTER 5 ■ Infrastructure as a Service (IaaS)
SECTION II Risk Analysis and Division of Responsibility
CHAPTER 6 ■ Risk and Trust Assessment: Schemes for Cloud Services
CHAPTER 7 ■ Managing Risk in the Cloud
CHAPTER 8 ■ Cloud Security Risk Management
CHAPTER 9 ■ Secure Cloud Risk Management: Risk Mitigation Methods
SECTION III Securing the Cloud Infrastructure
CHAPTER 10 ■ Specification and Enforcement of Access Policies in Emerging Scenarios
CHAPTER 11 ■ Cryptographic Key Management for Data Protection
CHAPTER 12 ■ Cloud Security Access Control: Distributed Access Control
CHAPTER 13 ■ Cloud Security Key Management: Cloud User Controls
CHAPTER 14 ■ Cloud Computing Security Essentials and Architecture
CHAPTER 15 ■ Cloud Computing Architecture and Security Concepts
CHAPTER 16 ■ Secure Cloud Architecture
SECTION IV Operating System and Network Security
CHAPTER 17 ■ Locking Down Cloud Servers
CHAPTER 18 ■ Third-Party Providers Integrity Assurance for Data Outsourcing
SECTION V Meeting Compliance Requirements
CHAPTER 19 ■ Negotiating Cloud Security Requirements with Vendors
CHAPTER 20 ■ Managing Legal Compliance Risk in the Cloud and Negotiating Personal Data Protection Requirements with Vendors
CHAPTER 21 ■ Integrity Assurance for Data Outsourcing
CHAPTER 22 ■ Secure Computation Outsourcing
CHAPTER 23 ■ Computation Over Encrypted Data
CHAPTER 24 ■ Trusted Computing Technology
CHAPTER 25 ■ Computing Technology for Trusted Cloud Security
CHAPTER 26 ■ Trusted Computing Technology and Proposals for Resolving Cloud Computing Security Problems
CHAPTER 27 ■ Assuring Compliance with Government Certification and Accreditation Regulations
CHAPTER 28 ■ Government Certification, Accreditation, Regulations, and Compliance Risks
SECTION VI Preparing for Disaster Recovery
CHAPTER 29 ■ Simplifying Secure Cloud Computing Environments with Cloud Data Centers
CHAPTER 30 ■ Availability, Recovery, and Auditing across Data Centers
SECTION VII Advanced Cloud Computing Security
CHAPTER 31 ■ Advanced Security Architectures for Cloud Computing
CHAPTER 32 ■ Side-Channel Attacks and Defenses on Cloud Traffic
CHAPTER 33 ■ Clouds Are Evil
CHAPTER 34 ■ Future Directions in Cloud Computing Security: Risks and Challenges
APPENDIX A: LIST OF TOP CLOUD COMPUTING SECURITY IMPLEMENTATION AND DEPLOYMENT COMPANIES
APPENDIX B: LIST OF CLOUD COMPUTING SECURITY PRODUCTS AND SERVICES
INDEX
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Prev
Previous Chapter
Half Title
Next
Next Chapter
Copyright Page
Cloud Computing
SECURITY
FOUNDATIONS AND CHALLENGES
EDITED BY
JOHN R. VACCA
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset