TY - BOOK AU - Abbadi,Imad M. ED - Ohio Library and Information Network. TI - Cloud management and security AV - QA76.585 .A23 2014 U1 - 004.6782 23 PY - 2015/// CY - New Delhi PB - Wiley KW - Cloud computing KW - Web services KW - Computer security KW - Electronic books N1 - computer bookfair2016; Includes bibliographical references and index; Preface References 1 Introduction 1.1 Overview 1.2 Cloud definition 1.3 Cloud evolution 1.4 Cloud services 1.5 Cloud deployment types 1.6 Main challenges of Clouds 1.7 Summary 1.8 Exercises Part One Cloud management 2 Cloud Structure 2.1 Introduction 2.2 Infrastructure components 2.3 Cloud Layers 2.4 Cloud relations 2.5 Cloud dynamics 2.6 Data types 2.7 Summary 2.8 Exercises 3 Fundamentals of Cloud management 3.1 Introduction 3.2 Clouds management services 3.3 Virtual control center 3.4 Prerequisite input-data for the management services 3.5 Management of user requirements 3.6 Summary 3.7 Exercises 4 Cloud properties 4.1 Introduction 4.2 Adaptability property 4.3 Resilience property 4.4 Scalability property 4.5 Availability property 4.6 Reliability property 4.7 Security and privacy property 4.8 Business model 4.9 Summary 4.10 Exercises 5 Automated management services 5.1 Introduction 5.2 Virtual layer self-managed services 5.3 Virtual services interdependency 5.4 Application layer self-managed services 5.5 Application services interdependency 5.6 Security and privacy by design 5.7 Multi-tier application deployment in the Cloud 5.8 Main challenges and requirements 5.9 Summary 5.10 Exercises Part Two Clouds security fundamentals 6 Background 6.1 Topics flow 6.2 Trusted Computing 6.3 Summary 7 Challenges for establishing trust in Clouds 7.1 Introduction 7.2 Effects of Cloud dynamism on trust relationships 7.3 Challenges 7.4 Summary 7.5 Exercises 8 Establishing trust in Clouds 8.1 Introduction 8.2 Organization requirements 8.3 Framework requirements 8.4 Device properties 8.5 Framework architecture 8.6 Required software agents 8.7 Framework workflow 8.8 Discussion and analysis 8.9 Summary 8.10 Exercises 9 Clouds chains of trust 9.1 Introduction 9.2 Software agents revision 9.3 Roots of and chains of trust definition 9.4 Intra-layer chains of trust 9.5 Trust across layers 9.6 Summary 9.7 Exercises 10 Provenance in Clouds 10.1 Introduction 10.2 Motivating scenarios 10.3 Log records management and requirements 10.4 Framework domain architecture 10.5 Framework software agents 10.6 Framework workflow 10.7 Threat analysis 10.8 Discussion and future directions 10.9 Exercises 11 Insiders 11.1 Introduction 11.2 Insiders definition 11.3 Conceptual models 11.4 Summary 11.5 Exercises Part Three Practical examples 12 Real life examples 12.1 Open Stack 12.2 Amazon web services 12.3 Component architecture 12.4 Prototype 12.5 Summary 13 Case Study 13.1 Scenario 13.2 Home healthcare architecture in the Cloud 13.3 Insiders analysis for home healthcare 13.4 Cloud threats; Available to OhioLINK libraries N2 - "This book discusses the foundations of Cloud computing, and covers in detail two main aspects of Cloud computing"-- UR - http://dx.doi.org/10.1002/9781118817087 UR - http://proxy.ohiolink.edu:9099/login?url=http://dx.doi.org/10.1002/9781118817087 ER -