000772299 000__ 03300cam\a2200517Ii\4500 000772299 001__ 772299 000772299 005__ 20230306142534.0 000772299 006__ m\\\\\o\\d\\\\\\\\ 000772299 007__ cr\cn\nnnunnun 000772299 008__ 161006s2016\\\\sz\\\\\\ob\\\\000\0\eng\d 000772299 019__ $$a960165167$$a962350537$$a964806823$$a967618743 000772299 020__ $$a9783319449623$$q(electronic book) 000772299 020__ $$a3319449621$$q(electronic book) 000772299 020__ $$z9783319449616 000772299 020__ $$z3319449613 000772299 0247_ $$a10.1007/978-3-319-44962-3$$2doi 000772299 035__ $$aSP(OCoLC)ocn959980031 000772299 035__ $$aSP(OCoLC)959980031$$z(OCoLC)960165167$$z(OCoLC)962350537$$z(OCoLC)964806823$$z(OCoLC)967618743 000772299 040__ $$aN$T$$beng$$erda$$epn$$cN$T$$dIDEBK$$dN$T$$dGW5XE$$dEBLCP$$dYDX$$dUPM$$dVT2$$dIDB$$dUAB 000772299 049__ $$aISEA 000772299 050_4 $$aQA76.585 000772299 08204 $$a004.67/82$$223 000772299 24500 $$aElements of cloud storage security :$$bconcepts, designs and optimized practices /$$cTatiana Galibus, Viktor V. Krasnoproshin, Robson de Oliveira Albuquerque, Edison Pignaton de Freitas. 000772299 264_1 $$aCham, Switzerland :$$bSpringer,$$c[2016] 000772299 300__ $$a1 online resource. 000772299 336__ $$atext$$btxt$$2rdacontent 000772299 337__ $$acomputer$$bc$$2rdamedia 000772299 338__ $$aonline resource$$bcr$$2rdacarrier 000772299 347__ $$atext file$$bPDF$$2rda 000772299 4901_ $$aSpringer Briefs in computer science 000772299 504__ $$aIncludes bibliographical references. 000772299 506__ $$aAccess limited to authorized users. 000772299 520__ $$aThis work provides guidelines for the practical implementation of security architecture in a particular corporate cloud. The authors are mathematicians and specialists in data modeling and security. Experience of scientific collaboration with industry inspired the authors to attempt to conceptualize the common processes and strategies in cloud security, in order to make security system deployment as simple and transparent as possible. The deployment is broken into several essential steps that allow the functionality of security architecture for any cloud to be split into a set of modules. The first step is the level of architecture where the authentication and key establishment procedures are identified. The second step provides the support of the authorization and other additional security mechanisms for each component of the cloud. The continuous verification of security support on all levels (data, processes and communication channels) helps to avoid common security breaches and protect against the most dangerous attacks. Additionally, performing the proposed optimization of the selected set of mechanisms will enhance the efficiency of the security system. 000772299 588__ $$aDescription based on print version record. 000772299 650_0 $$aCloud computing$$xSecurity measures. 000772299 650_0 $$aData protection. 000772299 7001_ $$aGalibus, Tatiana. 000772299 7001_ $$aKrasnoproshin, Viktor V. 000772299 7001_ $$aAlbuquerque, Robson de Oliveira. 000772299 7001_ $$aPignaton de Freitas, Edison. 000772299 77608 $$iPrint version:$$tElements of Cloud Storage Security.$$d[Place of publication not identified] : Springer-Verlag New York Inc 2016$$z9783319449616$$w(OCoLC)954429013 000772299 830_0 $$aSpringerBriefs in computer science. 000772299 852__ $$bebk 000772299 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-319-44962-3$$zOnline Access$$91397441.1 000772299 909CO $$ooai:library.usi.edu:772299$$pGLOBAL_SET 000772299 980__ $$aEBOOK 000772299 980__ $$aBIB 000772299 982__ $$aEbook 000772299 983__ $$aOnline 000772299 994__ $$a92$$bISE