Поиск по каталогу |
(строгое соответствие)
|
- Профессиональная
- Научно-популярная
- Художественная
- Публицистика
- Детская
- Искусство
- Хобби, семья, дом
- Спорт
- Путеводители
- Блокноты, тетради, открытки
PRE for Cloud Security. Proxy Re-Encryption for Ensuring Confidentiality in Cloud Computing Security
В наличии
Местонахождение: Алматы | Состояние экземпляра: новый |
Бумажная
версия
версия
Автор: LINDA HEPSIBA C and JEMIMA PRIYADARSINI R
ISBN: 9786206159650
Год издания: 1905
Формат книги: 60×90/16 (145×215 мм)
Количество страниц: 76
Издательство: LAP LAMBERT Academic Publishing
Цена: 25713 тг
Положить в корзину
Позиции в рубрикаторе
Отрасли знаний:Код товара: 758865
Способы доставки в город Алматы * комплектация (срок до отгрузки) не более 2 рабочих дней |
Самовывоз из города Алматы (пункты самовывоза партнёра CDEK) |
Курьерская доставка CDEK из города Москва |
Доставка Почтой России из города Москва |
Аннотация: Confidentiality is a major concern for cloud computing users who must ensure that their sensitive data is protected from unauthorized access or exposure, while still allowing for efficient sharing and collaboration among authorized parties. To address this challenge, a variety of encryption and access control techniques have been proposed and deployed, with varying levels of success.One promising approach to ensuring confidentiality in cloud computing is through the use of proxy re-encryption(PRE), which allows for the secure delegation of decryption rights from one party to another without compromising the privacy of the underlying data. PRE offers a number of advantages over traditional encryption techniques, including the ability to support fine-grained access control,efficient key management, and secure collaboration in multi-party environments.This book provides a comprehensive overview of PRE and its applications in cloud computing security. It covers the theoretical foundations of PRE, including its mathematical underpinnings and security properties, as well as practical aspects such as key management, performance optimization, and integration with other security mechanisms.
Ключевые слова: Cloud Computing, security, confidentiality, Decentralized, Proxy Re-Encryption