The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.04 - July/August (2010 vol.8)
pp: 55-57
Lori M. Kaufman , BAE Systems
ABSTRACT
Because cloud-computing environments' security vulnerabilities differ from those of traditional data centers, perimeter-security approaches will no longer work. Security must move from the perimeter to the virtual machines.
INDEX TERMS
cloud computing, virtualization, virtual machines data centers, security and privacy
CITATION
Lori M. Kaufman, "Can Public-Cloud Security Meet Its Unique Challenges?", IEEE Security & Privacy, vol.8, no. 4, pp. 55-57, July/August 2010, doi:10.1109/MSP.2010.120
REFERENCES
1. P. Mell and T. Grance, "The NIST Definition of Cloud Computing," ver. 15, US Nat'l Inst. of Standards and Technology, 7 Oct. 2009; http://csrc.nist.gov/groups/SNS/cloud-computing cloud-def-v15.doc.
2. 2010 State of Virtualization Security Survey, Prism Microsystems, Apr. 2010; www.prismmicrosys.com/documentsVirtualizationSecuritySurvey2010.pdf .
3. J.W. Rittinghouse and J.F. Ransome, "Cloud Security Challenges," Cloud Computing: Implementation, Management, and Security, CRC Press, 2009, pp. 158–161; www.infosectoday.com/ArticlesCloud_Security_Challenges.htm .
4. Cloud Computing Security: Making Virtual Machines Cloud-Ready, Trend Micro, Aug. 2009.
5 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool