Results 261 to 270 of about 46,558 (308)

Security and Compliance in Clouds [PDF]

open access: possible, 2011
The use of cloud computing services is an attractive opportunity for companies to improve IT Services and to achieve almost unlimited scalability of the IT infrastructure, and all of this at a significantly reduced cost than this is possible with internal resources. However, the use of a cloud service requires a company to trust the vendor to deal with
Jan Jürjens, Kristian Beckers
openaire   +1 more source

Cloud Computing Security [PDF]

open access: possibleInternational Journal of Ambient Computing and Intelligence, 2011
In this paper, the authors focus on Cloud Computing, which is a distributed architecture that centralizes server resources on quite a scalable platform so as to provide on demand’ computing resources and services The authors outline what cloud computing is, the various cloud deployment models and the main security risks and issues that are currently ...
Sean Carlin, Kevin Curran
openaire   +1 more source

Cloud Security

2013
A computer cloud is a target-rich environment for malicious individuals and criminal organizations. A cloud faces several types of security threat: traditional ones, threats related to system availability, and threats related to third-party data control.
Thomas W. Shinder   +2 more
openaire   +4 more sources

Home - About - Disclaimer - Privacy