Key Technologies and implementations of trusted cloud security
Basic Information
Author: Li Hong Li Hao
Press: People's post and telecommunications Press
ISBN: 9787115229939
Mounting time:
Published on: February 1, June 2010
Start: 16
For more details, see: http://www.china-pub.com/51125
Edit recommendations
Key cloud security technologies
Publish nine trusted cloud security system solutions
Provide key code for the solution
Recommended by many top experts
Introduction
As cloud computing technology is widely used, the credibility and security of cloud computing are highlighted.
This book describes how to use trusted cloud security technology to solve cloud computing credibility and security problems. Trusted cloud security technology is a technology that enables trusted computing and Secure Computing for people interacting on the cloud in a cloud computing environment.
This book is divided into 8 parts and consists of 22 chapters. Starting with fingerprint, face, speech recognition, and cryptography technologies, we will explain the contents of trusted cloud security technologies, then it focuses on the mathematical theory, trusted Cryptography technology, trusted pattern recognition technology, and trusted fusion verification technology of the Point Set Topology group theory, finally, the development tools of trusted security cloud systems and the application of trusted cloud security technology are explained.
This book is suitable for Engineers interested in learning trusted cloud security technologies, as well as students and students of major majors in colleges and universities. It can also be used as a reference book for special researchers on the above projects.
Media comment
Trust and security are basic requirements of cloud computing.
Guo Benyu, a doctoral advisor, former Principal of Shanghai University of Science and Technology
Cloud computing has been enhanced by credibility and security.
Yu Zhenyu, Chief Engineer of Shanghai huaxiong Smart Card Technology Co., Ltd., founder of Shanghai Public Transport Card System
Cloud computing in China should be trusted and secure.
Zhu Sanyuan, Researcher, vice chairman of China Software Industry Association
Cloud computing is inseparable from trusted cloud security technology.
Zong Yu, Senior Engineer, President of China Computer Industry Association, Shanghai Computer Industry Association
Grasp the world trend of cloud computing and tap into trusted cloud security technologies.
Former Vice President of Computer Science and Technology Research Institute of Shanghai Jiao Tong University, director of Minicomputer Research Institute of Shanghai Jiao Tong University
Bai yingcai, doctoral advisor, Professor, Shanghai Jinqiao Network Engineering Center
Directory
1st overview of trusted cloud Security Technology
Chapter 2 Development Status of trusted cloud Security Technology
Chapter 2 Technical Features of trusted cloud security
Part 1 methods of trusted cloud security technical attributes
Chapter 2 basic attributes of trusted cloud Security Technology
Chapter 2 basic methods of trusted cloud Security Technology
Part 1 trusted Cryptography technology
Chapter 1 random generator technology of trusted Cryptography
Chapter 2 trusted cryptography symmetric encryption/decryption technology
Chapter 2 asymmetric encryption/decryption technology of trusted Cryptography
Part 1 trusted integrated Verification Technology
Chapter 4 digital signature technology for trusted fusion Verification
Chapter 2 trusted integrated authentication certificate authentication technology
Chapter 2 Electronic Authentication Technology for trusted integration verification
Part 1 trusted Pattern Recognition Technology
Chapter 2 trusted face Pattern Recognition Technology
Chapter 2 trusted fingerprint pattern recognition technology
Chapter 2 trusted Speech Pattern Recognition Technology
Part 1 trusted and secure cloud system design
Chapter 2 Security cloud Technology Design
Chapter 2 trusted cloud Technology Design
Chapter 2 trusted security Cloud System Structure Design
Part 1 trusted security cloud system development tools
Chapter 4 trusted cloud computing solution for triple play
Chapter 2 trusted cloud security technology system development tools
Part 1 trusted cloud Security Technology Application
Chapter 2 trusted cloud security technology application Overview
Chapter 2 trusted e-government cloud Technology
Chapter 2 trusted e-commerce and household Cloud Technologies
Chapter 2 special applications of trusted cloud Security Technology