The Community for Technology Leaders
RSS Icon
Issue No.04 - July/August (2010 vol.8)
pp: 55-57
Lori M. Kaufman , BAE Systems
Because cloud-computing environments' security vulnerabilities differ from those of traditional data centers, perimeter-security approaches will no longer work. Security must move from the perimeter to the virtual machines.
cloud computing, virtualization, virtual machines data centers, security and privacy
Lori M. Kaufman, "Can Public-Cloud Security Meet Its Unique Challenges?", IEEE Security & Privacy, vol.8, no. 4, pp. 55-57, July/August 2010, doi:10.1109/MSP.2010.120
1. P. Mell and T. Grance, "The NIST Definition of Cloud Computing," ver. 15, US Nat'l Inst. of Standards and Technology, 7 Oct. 2009; cloud-def-v15.doc.
2. 2010 State of Virtualization Security Survey, Prism Microsystems, Apr. 2010; .
3. J.W. Rittinghouse and J.F. Ransome, "Cloud Security Challenges," Cloud Computing: Implementation, Management, and Security, CRC Press, 2009, pp. 158–161; .
4. Cloud Computing Security: Making Virtual Machines Cloud-Ready, Trend Micro, Aug. 2009.
20 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool