The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.02 - March/April (2010 vol.8)
pp: 57-58
Marjory S. Blumenthal , Georgetown University
ABSTRACT
Cloud computing promises much, but the hype might lure people into complacency. A narrowly negative depiction can help get people to think about the threats to security and privacy. We need to consider these threats carefully as we move toward a cloud-computing ecosystem.
INDEX TERMS
cloud computing, security and privacy, cybercrime, virtual machines
CITATION
Marjory S. Blumenthal, "Hide and Seek in the Cloud", IEEE Security & Privacy, vol.8, no. 2, pp. 57-58, March/April 2010, doi:10.1109/MSP.2010.70
REFERENCES
1. T. Ristenpart et al., "Hey, You, Get Off of My Cloud," Proc. 16th ACM Conf. Computer and Communications Security, ACM Press, 2009, pp. 199–212.
6 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool