Issue No. 02 - March/April (2010 vol. 8)
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/MSP.2010.70
Marjory S. Blumenthal , Georgetown University
Cloud computing promises much, but the hype might lure people into complacency. A narrowly negative depiction can help get people to think about the threats to security and privacy. We need to consider these threats carefully as we move toward a cloud-computing ecosystem.
cloud computing, security and privacy, cybercrime, virtual machines
Marjory S. Blumenthal, "Hide and Seek in the Cloud", IEEE Security & Privacy, vol. 8, no. , pp. 57-58, March/April 2010, doi:10.1109/MSP.2010.70