000 04864nam a22005055i 4500
001 978-1-4614-3296-8
003 DE-He213
005 20200421111656.0
007 cr nn 008mamaa
008 131024s2014 xxu| s |||| 0|eng d
020 _a9781461432968
_9978-1-4614-3296-8
024 7 _a10.1007/978-1-4614-3296-8
_2doi
050 4 _aQ342
072 7 _aUYQ
_2bicssc
072 7 _aCOM004000
_2bisacsh
082 0 4 _a006.3
_223
245 1 0 _aHigh Performance Cloud Auditing and Applications
_h[electronic resource] /
_cedited by Keesook J. Han, Baek-Young Choi, Sejun Song.
264 1 _aNew York, NY :
_bSpringer New York :
_bImprint: Springer,
_c2014.
300 _aXXIV, 360 p. 89 illus., 62 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
505 0 _aAn Overview of Issues and Recent Developments in Cloud Computing and Storage Security -- Moving Target Defense for Cloud Infrastructures: Lessons from Botnets -- Secure Mobile Cloud Computing and Security Issues -- Information Fusion in a Cloud-Enabled Environment -- Diagnosing Vulnerability Patterns in Cloud Audit Logs -- Exploiting Timing Side Channel for Secure Cloud Scheduling -- Federated Cloud Security Architecture for Secure and Agile Clouds.-Trust-Based Access Control for Secure Computing -- Assured Information Sharing (AIS) Using Private Clouds -- GPGPU Computing for Cloud Auditing -- CPU-GPU System Designes for High Performance Cloud Computing -- MapReduce Performance in Federated Cloud Computing Envorionments -- Improving Cloud Performance with Router-based Filtering.                             .
520 _aThis book mainly focuses on cloud security and high performance computing for cloud auditing. The book discusses emerging challenges and techniques developed for high performance semantic cloud auditing, and presents the state of the art in cloud auditing, computing and security techniques with focus on technical aspects and feasibility of auditing issues in federated cloud computing environments.   In summer 2011, the United States Air Force Research Laboratory (AFRL) CyberBAT Cloud Security and Auditing Team initiated the exploration of the cloud security challenges and future cloud auditing research directions that are covered in this book. This work was supported by the United States government funds from the Air Force Office of Scientific Research (AFOSR), the AFOSR Summer Faculty Fellowship Program (SFFP), the Air Force Research Laboratory (AFRL) Visiting Faculty Research Program (VFRP), the National Science Foundation (NSF) and the National Institute of Health (NIH). All chapters were partially supported by the AFOSR Information Operations and Security Program extramural and intramural funds (AFOSR/RSL Program Manager: Dr. Robert Herklotz).   Key Features: �         Contains surveys of cyber threats and security issues in cloud computing and presents secure cloud architectures �         Presents in-depth cloud auditing techniques, federated cloud security architectures, cloud access control models, and access assured information sharing technologies �         Outlines a wide range of challenges and provides solutions to manage and control very large and complex data sets                                                                                    .
650 0 _aEngineering.
650 0 _aSoftware engineering.
650 0 _aDatabase management.
650 0 _aComputational intelligence.
650 1 4 _aEngineering.
650 2 4 _aComputational Intelligence.
650 2 4 _aDatabase Management.
650 2 4 _aInformation Systems Applications (incl. Internet).
650 2 4 _aSoftware Engineering.
700 1 _aHan, Keesook J.
_eeditor.
700 1 _aChoi, Baek-Young.
_eeditor.
700 1 _aSong, Sejun.
_eeditor.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9781461432951
856 4 0 _uhttp://dx.doi.org/10.1007/978-1-4614-3296-8
912 _aZDB-2-ENG
942 _cEBK
999 _c54720
_d54720