Data Flow Management and Compliance in Cloud Computing

@article{Singh2015DataFM,
  title={Data Flow Management and Compliance in Cloud Computing},
  author={J. Singh and Julia E. Powles and Thomas Pasquier and J. Bacon},
  journal={IEEE Cloud Computing},
  year={2015},
  volume={2},
  pages={24-32}
}
As cloud computing becomes an increasingly dominant means of providing computing resources, the legal and regulatory issues associated with data in the cloud become more pronounced. These issues derive primarily from four areas: contract, data protection, law enforcement, and regulatory and common law protections for particularly sensitive domains such as health, finance, fiduciary relations, and intellectual property assets. From a technical perspective, these legal requirements all impose… Expand
33 Citations
Camflow: Managed Data-Sharing for Cloud Services
  • 41
  • PDF
Data-Centric Access Control for Cloud Computing
  • 16
  • PDF
Information Flow Audit for Transparency and Compliance in the Handling of Personal Data
  • Thomas Pasquier, D. Eyers
  • Computer Science
  • 2016 IEEE International Conference on Cloud Engineering Workshop (IC2EW)
  • 2016
  • 10
  • PDF
Information Flow Audit for PaaS Clouds
  • 26
  • PDF
On Information Flow Control and Audit for Demonstrable Compliance in the Cloud
  • PDF
Clouds of Things Need Information Flow Control with Hardware Roots of Trust
  • 10
  • PDF
Cloud Computing and Security Issues in the Cloud
...
1
2
3
4
...

References

SHOWING 1-10 OF 16 REFERENCES
Expressing and Enforcing Location Requirements in the Cloud Using Information Flow Control
  • 22
  • PDF
Camflow: Managed Data-Sharing for Cloud Services
  • 41
  • PDF
Information Flow Control for Secure Cloud Computing
  • 58
  • PDF
Policy, Legal and Regulatory Implications of a Europe-Only Cloud
  • 25
  • PDF
Twenty Security Considerations for Cloud-Supported Internet of Things
  • 185
  • PDF
A decentralized model for information flow control
  • 594
  • PDF
The Case for VM-Based Cloudlets in Mobile Computing
  • 3,086
  • PDF
Can homomorphic encryption be practical?
  • 850
  • PDF
...
1
2
...