Building the Infrastructure for Cloud Security: A Solutions View

For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This book will help address this information gap from an Information Technology solution and usage-centric view of cloud infrastructure security. The book hig...

Full description

Autores:
Tipo de recurso:
Book
Fecha de publicación:
2014
Institución:
Universidad de Bogotá Jorge Tadeo Lozano
Repositorio:
Expeditio: repositorio UTadeo
Idioma:
eng
OAI Identifier:
oai:expeditiorepositorio.utadeo.edu.co:20.500.12010/16757
Acceso en línea:
https://link.springer.com/book/10.1007/978-1-4302-6146-9
http://hdl.handle.net/20.500.12010/16757
https://doi.org/10.1007/978-1-4302-6146-9
Palabra clave:
Ciencias de la computación
Tecnología -- Software -- hardware
Seguridad de la nube
Seguridad de la infraestructura en la nube
Rights
License
Abierto (Texto Completo)
id UTADEO2_3aa38fad7e5757137157c2642a98b9a7
oai_identifier_str oai:expeditiorepositorio.utadeo.edu.co:20.500.12010/16757
network_acronym_str UTADEO2
network_name_str Expeditio: repositorio UTadeo
repository_id_str
dc.title.spa.fl_str_mv Building the Infrastructure for Cloud Security: A Solutions View
title Building the Infrastructure for Cloud Security: A Solutions View
spellingShingle Building the Infrastructure for Cloud Security: A Solutions View
Ciencias de la computación
Tecnología -- Software -- hardware
Seguridad de la nube
Seguridad de la infraestructura en la nube
title_short Building the Infrastructure for Cloud Security: A Solutions View
title_full Building the Infrastructure for Cloud Security: A Solutions View
title_fullStr Building the Infrastructure for Cloud Security: A Solutions View
title_full_unstemmed Building the Infrastructure for Cloud Security: A Solutions View
title_sort Building the Infrastructure for Cloud Security: A Solutions View
dc.subject.spa.fl_str_mv Ciencias de la computación
topic Ciencias de la computación
Tecnología -- Software -- hardware
Seguridad de la nube
Seguridad de la infraestructura en la nube
dc.subject.lemb.spa.fl_str_mv Tecnología -- Software -- hardware
Seguridad de la nube
Seguridad de la infraestructura en la nube
description For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This book will help address this information gap from an Information Technology solution and usage-centric view of cloud infrastructure security. The book highlights the fundamental technology components necessary to build and enable trusted clouds. Here also is an explanation of the security and compliance challenges organizations face as they migrate mission-criticalapplications to the cloud, and how trusted clouds, that have their integrity rooted in hardware, can address these challenges.This book provides:Use cases and solution reference architectures to enable infrastructure integrity and the creation of trusted pools leveraging Intel Trusted Execution Technology (TXT).Trusted geo-location management in the cloud, enabling workload and data location compliance and boundary control usages in the cloud.OpenStack-based reference architecture of tenant-controlled virtual machine and workload protection in the cloud.A reference design to enable secure hybrid clouds for a cloud bursting use case, providing infrastructure visibility and control to organizations.
publishDate 2014
dc.date.created.none.fl_str_mv 2014
dc.date.accessioned.none.fl_str_mv 2021-01-19T21:13:33Z
dc.date.available.none.fl_str_mv 2021-01-19T21:13:33Z
dc.type.coar.spa.fl_str_mv http://purl.org/coar/resource_type/c_2f33
format http://purl.org/coar/resource_type/c_2f33
dc.identifier.isbn.none.fl_str_mv 978-1-430-26145-2
978-1-430-26146-9
dc.identifier.other.none.fl_str_mv https://link.springer.com/book/10.1007/978-1-4302-6146-9
dc.identifier.uri.none.fl_str_mv http://hdl.handle.net/20.500.12010/16757
dc.identifier.doi.none.fl_str_mv https://doi.org/10.1007/978-1-4302-6146-9
identifier_str_mv 978-1-430-26145-2
978-1-430-26146-9
url https://link.springer.com/book/10.1007/978-1-4302-6146-9
http://hdl.handle.net/20.500.12010/16757
https://doi.org/10.1007/978-1-4302-6146-9
dc.language.iso.spa.fl_str_mv eng
language eng
dc.rights.coar.fl_str_mv http://purl.org/coar/access_right/c_abf2
dc.rights.local.spa.fl_str_mv Abierto (Texto Completo)
dc.rights.creativecommons.none.fl_str_mv https://creativecommons.org/licenses/by-nc-nd/4.0/legalcode
rights_invalid_str_mv Abierto (Texto Completo)
https://creativecommons.org/licenses/by-nc-nd/4.0/legalcode
http://purl.org/coar/access_right/c_abf2
dc.format.extent.spa.fl_str_mv 240 páginas
dc.format.mimetype.spa.fl_str_mv application/pdf
dc.publisher.spa.fl_str_mv Apress Grant: Intel
institution Universidad de Bogotá Jorge Tadeo Lozano
bitstream.url.fl_str_mv https://expeditiorepositorio.utadeo.edu.co/bitstream/20.500.12010/16757/2/license.txt
https://expeditiorepositorio.utadeo.edu.co/bitstream/20.500.12010/16757/1/Building%20TheInfrastructure%20For%20Cl_45.pdf
https://expeditiorepositorio.utadeo.edu.co/bitstream/20.500.12010/16757/3/Building%20TheInfrastructure%20For%20Cl_45.pdf.jpg
bitstream.checksum.fl_str_mv abceeb1c943c50d3343516f9dbfc110f
eebcc12841e19a9dca178356090a2e29
b52448b35a45de4fa0a7881b9ac4ddff
bitstream.checksumAlgorithm.fl_str_mv MD5
MD5
MD5
repository.name.fl_str_mv Repositorio Institucional - Universidad Jorge Tadeo Lozano
repository.mail.fl_str_mv expeditio@utadeo.edu.co
_version_ 1808495332216012800
spelling 2021-01-19T21:13:33Z2021-01-19T21:13:33Z2014978-1-430-26145-2978-1-430-26146-9https://link.springer.com/book/10.1007/978-1-4302-6146-9http://hdl.handle.net/20.500.12010/16757https://doi.org/10.1007/978-1-4302-6146-9240 páginasapplication/pdfengApress Grant: IntelCiencias de la computaciónTecnología -- Software -- hardwareSeguridad de la nubeSeguridad de la infraestructura en la nubeBuilding the Infrastructure for Cloud Security: A Solutions ViewAbierto (Texto Completo)https://creativecommons.org/licenses/by-nc-nd/4.0/legalcodehttp://purl.org/coar/access_right/c_abf2For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This book will help address this information gap from an Information Technology solution and usage-centric view of cloud infrastructure security. The book highlights the fundamental technology components necessary to build and enable trusted clouds. Here also is an explanation of the security and compliance challenges organizations face as they migrate mission-criticalapplications to the cloud, and how trusted clouds, that have their integrity rooted in hardware, can address these challenges.This book provides:Use cases and solution reference architectures to enable infrastructure integrity and the creation of trusted pools leveraging Intel Trusted Execution Technology (TXT).Trusted geo-location management in the cloud, enabling workload and data location compliance and boundary control usages in the cloud.OpenStack-based reference architecture of tenant-controlled virtual machine and workload protection in the cloud.A reference design to enable secure hybrid clouds for a cloud bursting use case, providing infrastructure visibility and control to organizations.http://purl.org/coar/resource_type/c_2f33Yeluri, RaghuramCastro León, EnriqueLICENSElicense.txtlicense.txttext/plain; charset=utf-82938https://expeditiorepositorio.utadeo.edu.co/bitstream/20.500.12010/16757/2/license.txtabceeb1c943c50d3343516f9dbfc110fMD52open accessORIGINALBuilding TheInfrastructure For Cl_45.pdfBuilding TheInfrastructure For Cl_45.pdfVer documentoapplication/pdf8836102https://expeditiorepositorio.utadeo.edu.co/bitstream/20.500.12010/16757/1/Building%20TheInfrastructure%20For%20Cl_45.pdfeebcc12841e19a9dca178356090a2e29MD51open accessTHUMBNAILBuilding TheInfrastructure For Cl_45.pdf.jpgBuilding TheInfrastructure For Cl_45.pdf.jpgIM Thumbnailimage/jpeg20207https://expeditiorepositorio.utadeo.edu.co/bitstream/20.500.12010/16757/3/Building%20TheInfrastructure%20For%20Cl_45.pdf.jpgb52448b35a45de4fa0a7881b9ac4ddffMD53open access20.500.12010/16757oai:expeditiorepositorio.utadeo.edu.co:20.500.12010/167572021-01-31 21:54:07.967open accessRepositorio Institucional - Universidad Jorge Tadeo Lozanoexpeditio@utadeo.edu.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