Issue No.09 - Sept. (2011 vol.44)
Francisco Rocha , University of Lisbon, Carnegie Mellon University
Miguel Correia , Technical University of Lisbon, Portugal
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/MC.2011.223
The boundary between the trusted inside and the untrusted outside blurs when a company adopts cloud computing. The organization's applications and data are no longer onsite, fundamentally changing the definition of a malicious insider.
Cloud computing, Privacy, Trusted computing, TrustVisor
Francisco Rocha, Miguel Correia, "The Final Frontier: Confidentiality and Privacy in the Cloud", Computer, vol.44, no. 9, pp. 44-50, Sept. 2011, doi:10.1109/MC.2011.223