Cryptography for Security and Privacy in Cloud Computing. (Record no. 83851)

MARC details
000 -LEADER
fixed length control field 06014nam a22004573i 4500
001 - CONTROL NUMBER
control field EBC1463547
003 - CONTROL NUMBER IDENTIFIER
control field MiAaPQ
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20191126113938.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field m o d |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr cnu||||||||
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 191125s2013 xx o ||||0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781608075768
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9781608075751
035 ## - SYSTEM CONTROL NUMBER
System control number (MiAaPQ)EBC1463547
035 ## - SYSTEM CONTROL NUMBER
System control number (Au-PeEL)EBL1463547
035 ## - SYSTEM CONTROL NUMBER
System control number (CaPaEBR)ebr11069356
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)905527313
040 ## - CATALOGING SOURCE
Original cataloging agency MiAaPQ
Language of cataloging eng
Description conventions rda
-- pn
Transcribing agency MiAaPQ
Modifying agency MiAaPQ
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number TK5105.59.R37 2014
082 0# - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.82
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Rass, Stefan.
9 (RLIN) 85395
245 10 - TITLE STATEMENT
Title Cryptography for Security and Privacy in Cloud Computing.
250 ## - EDITION STATEMENT
Edition statement 1st ed.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Norwood :
Name of producer, publisher, distributor, manufacturer Artech House,
Date of production, publication, distribution, manufacture, or copyright notice 2013.
264 #4 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Date of production, publication, distribution, manufacture, or copyright notice ©2016.
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource (264 pages)
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Media type code c
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term online resource
Carrier type code cr
Source rdacarrier
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Intro -- Cryptography for Security and Privacy in Cloud Computing -- Contents -- Chapter 1 Introduction -- 1.1 MODERN CRYPTOGRAPHY -- 1.2 CLOUD COMPUTING -- 1.3 DIGITAL IDENTITY, AUTHENTICATION, AND ACCESS CONTROL -- 1.4 PRIVACY-ENHANCING TECHNOLOGIES -- 1.5 OUTLINE -- References -- Chapter 2 Fundamentals -- 2.1 NUMBER THEORY -- 2.1.1 Drawing Random Coprime Elements -- 2.1.2 Computing Inverse Elements Modulo a Prime -- 2.1.3 Computing Negative Powers Modulo a Prime -- 2.1.4 Getting (Large) Primes -- 2.1.5 Quadratic Residues, Legendre Symbol, and Jacobi Symbol -- 2.2 RINGS, GROUPS, FIELDS, AND LATTICES -- 2.2.1 Finding a Generating Element -- 2.2.2 Groups of Quadratic Residues -- 2.2.3 Constructing a Subgroup -- 2.2.4 Constructing General Finite Fields -- 2.2.5 Homomorphy and Isomorphy -- 2.2.6 Elliptic Curves -- 2.2.7 Pairings -- 2.2.8 Lattices -- 2.3 CODING -- 2.4 COMPUTATIONAL COMPLEXITY -- 2.4.1 Computational Intractability -- 2.4.2 Factorization-Related Assumptions -- 2.4.3 Discrete-Logarithm-Related Assumptions -- 2.4.4 Lattice Assumptions -- 2.5 CRYPTOGRAPHIC PRIMITIVES AND SECURITY MODELS -- 2.5.1 Reductionist Security -- 2.5.2 Random OracleModel and Standard Model -- 2.5.3 Cryptographic Hash Functions -- 2.5.4 Hashing to Algebraic Structures -- 2.5.5 Merkle Trees -- 2.5.6 Secret-Sharing -- 2.5.7 Public Key Cryptography -- 2.5.8 Public Key Encryption -- 2.5.9 Digital Signature Schemes -- 2.5.10 Commitment Schemes -- 2.5.11 Zero-Knowledge Proofs -- References -- Chapter 3 Protection of Identifying Information -- 3.1 PRIVACY PRESERVING AUTHENTICATION -- 3.1.1 Anonymous Password Authentication and AuthenticatedKey Exchange -- 3.1.2 Anonymous Authentication from PKE -- 3.1.3 Group and Ring Signatures -- 3.1.4 Revocable Anonymity -- 3.1.5 Blind Signatures for Anonymous Transactions -- 3.2 ANONYMOUS CREDENTIAL SYSTEMS.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 3.2.1 Camenisch-Lysyanskaya Credentials (Idemix) -- 3.2.2 Brands Credentials (U-Prove) -- 3.3 PRIVACY PRESERVING DISCLOSURE OF DATA -- 3.3.1 k-Anonymity, ℓ-Diversity, and t-Closeness -- 3.3.2 Redactable and Sanitizable Signatures -- 3.4 PRIVACY PRESERVING ACCESS TO RESOURCES -- 3.4.1 Anonymous Communication -- 3.4.2 Private Information Retrieval -- 3.4.3 Oblivious RAM -- References -- Chapter 4 Privacy-Enhancing Encryption -- 4.1 ACCESS CONTROL THROUGH ENCRYPTION -- 4.1.1 Attribute-Based Encryption -- 4.1.2 Predicate Encryption -- 4.1.3 Functional Encryption -- 4.1.4 Summary -- 4.2 COMPUTING ON ENCRYPTED DATA -- 4.2.1 Group Homomorphic Encryption -- 4.2.2 Somewhat Homomorphic Encryption -- 4.2.3 Fully Homomorphic Encryption -- 4.2.4 Alternative Approaches -- 4.2.5 Summary -- References -- Chapter 5 Remote Data Storage -- 5.1 REMOTE DATA CHECKING -- 5.1.1 Proofs of Retrievability (PoR) -- 5.1.2 Provable Data Possession (PDP) -- 5.1.3 Comparison of PoR and PDP -- 5.2 SECURE DATA DEDUPLICATION -- 5.2.1 Convergent or Message-Locked Encryption -- 5.2.2 Proofs of Ownership -- 5.3 SEARCHABLE ENCRYPTION -- 5.3.1 Categorization -- 5.3.2 Symmetric Searchable Encryption -- 5.3.3 Asymmetric Searchable Encryption -- 5.3.4 Security of Searchable Encryption -- 5.4 AVAILABILITY IN THE CLOUD -- References -- Chapter 6 Practical Issues -- 6.1 THE ROLE AND LIMITS OF CRYPTOGRAPHY -- 6.2 IMPLEMENTATIONS AND STANDARDIZATION -- 6.2.1 Implementations -- 6.2.2 Standardization -- 6.3 SELECTED CLOUDS -- 6.3.1 Commercial Clouds -- 6.3.2 Secure Cloud Storage Architectures -- 6.4 OUTLOOK -- References -- List of Symbols -- Abbreviations -- About the Authors.
520 ## - SUMMARY, ETC.
Summary, etc. As is common practice in research, many new cryptographic techniques have been developed to tackle either a theoretical question or foreseeing a soon to become reality application. Cloud computing is one of these new areas, where cryptography is expected to unveil its power by bringing striking new features to the cloud. Cloud computing is an evolving paradigm, whose basic attempt is to shift computing and storage capabilities to external service providers.This resource offers an overview of the possibilities of cryptography for protecting data and identity information, much beyond well-known cryptographic primitives such as encryption or digital signatures. This book represents a compilation of various recent cryptographic primitives, providing readers with the features and limitations of each.
588 ## - SOURCE OF DESCRIPTION NOTE
Source of description note Description based on publisher supplied metadata and other sources.
590 ## - LOCAL NOTE (RLIN)
Local note Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2019. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer networks--Security measures.
9 (RLIN) 85396
655 #4 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
9 (RLIN) 85397
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Slamanig, Daniel.
9 (RLIN) 85398
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Print version:
Main entry heading Rass, Stefan
Title Cryptography for Security and Privacy in Cloud Computing
Place, publisher, and date of publication Norwood : Artech House,c2013
International Standard Book Number 9781608075751
797 2# - LOCAL ADDED ENTRY--CORPORATE NAME (RLIN)
Corporate name or jurisdiction name as entry element ProQuest (Firm)
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://ebookcentral.proquest.com/lib/thebc/detail.action?docID=1463547">https://ebookcentral.proquest.com/lib/thebc/detail.action?docID=1463547</a>
Public note Click to View
887 ## - NON-MARC INFORMATION FIELD
Content of non-MARC field EBK
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type Ebrary
Holdings
Withdrawn status Lost status Damaged status Not for loan Home library Current library Date acquired Total Checkouts Barcode Date last seen Price effective from Koha item type
        Afghanistan Afghanistan 26/11/2019   EBKAF00086016 26/11/2019 26/11/2019 Ebrary
        Algeria Algeria           Ebrary
        Cyprus Cyprus           Ebrary
        Egypt Egypt           Ebrary
        Libya Libya           Ebrary
        Morocco Morocco           Ebrary
        Nepal Nepal 26/11/2019   EBKNP00086016 26/11/2019 26/11/2019 Ebrary
        Sudan Sudan           Ebrary
        Tunisia Tunisia           Ebrary