Libros bestsellers hasta 50% dcto  Ver más

menu

0
  • argentina
  • chile
  • colombia
  • españa
  • méxico
  • perú
  • estados unidos
  • internacional
portada Access Control Management in Cloud Environments (in English)
Type
Physical Book
Publisher
Language
English
Pages
300
Format
Paperback
Dimensions
23.4 x 15.6 x 1.7 cm
Weight
0.45 kg.
ISBN13
9783030317317

Access Control Management in Cloud Environments (in English)

Hua Wang (Author) · Jinli Cao (Author) · Yanchun Zhang (Author) · Springer · Paperback

Access Control Management in Cloud Environments (in English) - Wang, Hua ; Cao, Jinli ; Zhang, Yanchun

Physical Book

$ 52.09

$ 54.99

You save: $ 2.90

5% discount
  • Condition: New
It will be shipped from our warehouse between Wednesday, May 29 and Thursday, May 30.
You will receive it anywhere in United States between 1 and 3 business days after shipment.

Synopsis "Access Control Management in Cloud Environments (in English)"

This textbook introduces new business concepts on cloud environments such as secure, scalable anonymity and practical payment protocols for the Internet of things and Blockchain technology. The protocol uses electronic cash for payment transactions. In this new protocol, from the viewpoint of banks, consumers can improve anonymity if they are worried about disclosure of their identities in the cloud. Currently, there is not a book available that has reported the techniques covering the protocols with anonymizations and Blockchain technology. Thus this will be a useful book for universities to purchase. This textbook provides new direction for access control management and online business, with new challenges within Blockchain technology that may arise in cloud environments. One is related to the authorization granting process. For example, when a role is granted to a user, this role may conflict with other roles of the user or together with this role; the user may have or derive a high level of authority. Another is related to authorization revocation. For instance, when a role is revoked from a user, the user may still have the role. Experts will get benefits from these challenges through the developed methodology for authorization granting algorithm, and weak revocation and strong revocation algorithms.

Customers reviews

More customer reviews
  • 0% (0)
  • 0% (0)
  • 0% (0)
  • 0% (0)
  • 0% (0)

Frequently Asked Questions about the Book

All books in our catalog are Original.
The book is written in English.
The binding of this edition is Paperback.

Questions and Answers about the Book

Do you have a question about the book? Login to be able to add your own question.

Opinions about Bookdelivery

More customer reviews