Can Public-Cloud Security Meet Its Unique Challenges?

@article{Kaufman2010CanPS,
  title={Can Public-Cloud Security Meet Its Unique Challenges?},
  author={Lori M. Kaufman},
  journal={IEEE Security & Privacy},
  year={2010},
  volume={8},
  pages={55-57}
}
  • Lori M. Kaufman
  • Published in IEEE Security & Privacy 2010
  • Computer Science
  • Because cloud-computing environments' security vulnerabilities differ from those of traditional data centers, perimeter-security approaches will no longer work. Security must move from the perimeter to the virtual machines. 

    Create an AI-powered research feed to stay up to date with new papers like this posted to ArXiv

    Topics from this paper.

    Citations

    Publications citing this paper.
    SHOWING 1-10 OF 40 CITATIONS

    Security of a Public Cloud

    VIEW 3 EXCERPTS
    CITES BACKGROUND
    HIGHLY INFLUENCED

    Secure cloud computing in the financial services market

    VIEW 5 EXCERPTS
    CITES BACKGROUND
    HIGHLY INFLUENCED

    Toward Resilient Stream Processing on Clouds using Moving Target Defense

    VIEW 1 EXCERPT

    Identifying critical challenges in the adoption of cloud-based services

    VIEW 1 EXCERPT
    CITES BACKGROUND

    Network-Based Secret Communication in Clouds: A Survey

    VIEW 2 EXCERPTS
    CITES BACKGROUND

    Seclogmon : Security in cloud computing using activity log for consumer data protection

    • T S Sridhar, V. G. Vivek, R Shekhar
    • Computer Science
    • 2017 2nd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT)
    • 2017
    VIEW 1 EXCERPT
    CITES BACKGROUND

    References

    Publications referenced by this paper.