Search within the TIB website or find specialist literature and information in the TIB Portal.
The TIB Portal allows you to search the library's own holdings and other data sources simultaneously. By restricting the search to the TIB catalogue, you can search exclusively for printed and digital publications in the entire stock of the TIB library.
1 Copy
Access LUH
Machine generated contents note: 1.Introduction -- 1.1.Motivation -- 1.2.About this Book -- 1.3.Roadmap -- 2.Cloud Definition and Technologies -- 2.1.Defining the Cloud -- 2.2.Cloud Approaches and Technologies -- 2.2.1.Amazon Web Services -- 2.2.2.MS Azure -- 2.2.3.OpenStack -- 2.3.Outsourcing and the Cloud -- 2.4.Accreditation and Certification Issues -- 2.5.Conclusions -- 3.Cloud Security and Virtualization -- 3.1.Introduction -- 3.2.Cloud Security Issues -- 3.2.1.A Model for Cloud Security -- 3.3.General Cloud Protection -- 3.3.1.Threat Model -- 3.3.2.Requirements -- 3.3.3.Effective Monitoring -- 3.4.Technological Details -- 3.5.Attacks and Responses -- 3.5.1.Dealing with Attacks -- 3.6.Nested Virtualization and Finer-Grained Security -- 3.7.Relevant Contributions to Virtualization Security -- 3.8.Conclusion -- 4.Privacy Issues in the Cloud -- 4.1.Introduction -- 4.2.Cloud Privacy Issues -- 4.3.Encryption-Based Solutions For Confidentiality -- 4.4.Statistical Disclosure -- 4.5.Data Splitting -- 4.6.Other Security Aspects -- 4.7.Relevant Security Metrics -- 4.8.Other Relevant Approaches and Open Issues -- 4.9.Conclusion -- 5.Advanced Monitoring of Services -- 5.1.Introduction -- 5.1.1.Content and Organization -- 5.2.Modeling And Monitoring Approaches -- 5.2.1.VM Monitoring and Security -- 5.2.2.Modeling Complex Systems -- 5.3.Graph-Based Modeling and EPA -- 5.3.1.Advanced Scenario Graphs -- 5.3.2.Action Graph -- 5.3.3.Cooperating Graphs -- 5.3.4.Node (Re-)Labeling -- 5.4.Technological Details Discussion -- 5.5.Conclusion -- 6.Cloud Approaches to Resilience -- 6.1.Introduction -- 6.2.Problem Statement and Model -- 6.2.1.Modeling -- 6.3.Simpler Approaches -- 6.4.More Complex Approaches -- 6.4.1.Multiround Adaptive Assignment Matrix -- 6.4.2.A Possible Threat Model -- 6.4.3.Adaptive Approaches to Cheating Detection -- 6.5.Alternative Approaches to Reliability -- 6.6.Conclusion -- 7.Secure GPU Cloud -- 7.1.Introduction -- 7.2.GPUS and Computing -- 7.3.GPU Architectures -- 7.3.1.Global Memory -- 7.3.2.Shared Memory -- 7.3.3.Registers -- 7.4.GPU Cloud and Virtualization Approaches -- 7.4.1.Virtualized CUDA -- 7.4.2.GPU Cloud and Gaming -- 7.5.GPU Data Leakages -- 7.5.1.Exploiting Shared Memory -- 7.5.2.Exploiting Global Memory -- 7.6.Effective Solutions and Workarounds -- 7.7.Competing Technologies and Security -- 7.8.Conclusion -- 8.Security and Reliability of Cloud Networks -- 8.1.Introduction -- 8.2.Defining SDN and NFV -- 8.3.Virtual Networking Implementations -- 8.3.1.OpenDaylight -- 8.3.2.Open vSwitch -- 8.3.3.Ryu -- 8.4.Security Issues -- 8.5.Conclusion -- 9.Concluding Remarks -- 9.1.Summary of the Contributions -- 9.2.Boundary of the Presented Approaches and Outlook -- 9.3.A Perspective on Interesting Future Developments -- 10.References