Key Technologies and implementations of trusted cloud security

Source: Internet
Author: User
Tags asymmetric encryption

Key Technologies and implementations of trusted cloud security

Basic Information

Author: Li Hong Li Hao
Press: People's post and telecommunications Press
ISBN: 9787115229939
Mounting time:
Published on: February 1, June 2010
Start: 16
For more details, see: http://www.china-pub.com/51125

Edit recommendations

Key cloud security technologies
Publish nine trusted cloud security system solutions
Provide key code for the solution
Recommended by many top experts

Introduction

As cloud computing technology is widely used, the credibility and security of cloud computing are highlighted.
This book describes how to use trusted cloud security technology to solve cloud computing credibility and security problems. Trusted cloud security technology is a technology that enables trusted computing and Secure Computing for people interacting on the cloud in a cloud computing environment.
This book is divided into 8 parts and consists of 22 chapters. Starting with fingerprint, face, speech recognition, and cryptography technologies, we will explain the contents of trusted cloud security technologies, then it focuses on the mathematical theory, trusted Cryptography technology, trusted pattern recognition technology, and trusted fusion verification technology of the Point Set Topology group theory, finally, the development tools of trusted security cloud systems and the application of trusted cloud security technology are explained.
This book is suitable for Engineers interested in learning trusted cloud security technologies, as well as students and students of major majors in colleges and universities. It can also be used as a reference book for special researchers on the above projects.

Media comment

Trust and security are basic requirements of cloud computing.
Guo Benyu, a doctoral advisor, former Principal of Shanghai University of Science and Technology
Cloud computing has been enhanced by credibility and security.
Yu Zhenyu, Chief Engineer of Shanghai huaxiong Smart Card Technology Co., Ltd., founder of Shanghai Public Transport Card System
Cloud computing in China should be trusted and secure.
Zhu Sanyuan, Researcher, vice chairman of China Software Industry Association
Cloud computing is inseparable from trusted cloud security technology.
Zong Yu, Senior Engineer, President of China Computer Industry Association, Shanghai Computer Industry Association
Grasp the world trend of cloud computing and tap into trusted cloud security technologies.
Former Vice President of Computer Science and Technology Research Institute of Shanghai Jiao Tong University, director of Minicomputer Research Institute of Shanghai Jiao Tong University
Bai yingcai, doctoral advisor, Professor, Shanghai Jinqiao Network Engineering Center

Directory

1st overview of trusted cloud Security Technology
Chapter 2 Development Status of trusted cloud Security Technology
Chapter 2 Technical Features of trusted cloud security

Part 1 methods of trusted cloud security technical attributes
Chapter 2 basic attributes of trusted cloud Security Technology
Chapter 2 basic methods of trusted cloud Security Technology

Part 1 trusted Cryptography technology
Chapter 1 random generator technology of trusted Cryptography
Chapter 2 trusted cryptography symmetric encryption/decryption technology
Chapter 2 asymmetric encryption/decryption technology of trusted Cryptography

Part 1 trusted integrated Verification Technology
Chapter 4 digital signature technology for trusted fusion Verification
Chapter 2 trusted integrated authentication certificate authentication technology
Chapter 2 Electronic Authentication Technology for trusted integration verification

Part 1 trusted Pattern Recognition Technology
Chapter 2 trusted face Pattern Recognition Technology
Chapter 2 trusted fingerprint pattern recognition technology
Chapter 2 trusted Speech Pattern Recognition Technology

Part 1 trusted and secure cloud system design
Chapter 2 Security cloud Technology Design
Chapter 2 trusted cloud Technology Design
Chapter 2 trusted security Cloud System Structure Design

Part 1 trusted security cloud system development tools
Chapter 4 trusted cloud computing solution for triple play
Chapter 2 trusted cloud security technology system development tools

Part 1 trusted cloud Security Technology Application
Chapter 2 trusted cloud security technology application Overview
Chapter 2 trusted e-government cloud Technology
Chapter 2 trusted e-commerce and household Cloud Technologies
Chapter 2 special applications of trusted cloud Security Technology

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.