The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.02 - March/April (2010 vol.8)
pp: 57-58
Marjory S. Blumenthal , Georgetown University
ABSTRACT
Cloud computing promises much, but the hype might lure people into complacency. A narrowly negative depiction can help get people to think about the threats to security and privacy. We need to consider these threats carefully as we move toward a cloud-computing ecosystem.
INDEX TERMS
cloud computing, security and privacy, cybercrime, virtual machines
CITATION
Marjory S. Blumenthal, "Hide and Seek in the Cloud", IEEE Security & Privacy, vol.8, no. 2, pp. 57-58, March/April 2010, doi:10.1109/MSP.2010.70
REFERENCES
1. T. Ristenpart et al., "Hey, You, Get Off of My Cloud," Proc. 16th ACM Conf. Computer and Communications Security, ACM Press, 2009, pp. 199–212.
20 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool