The Community for Technology Leaders
Green Image
Issue No. 02 - March/April (2010 vol. 8)
ISSN: 1540-7993
pp: 57-58
Marjory S. Blumenthal , Georgetown University
ABSTRACT
Cloud computing promises much, but the hype might lure people into complacency. A narrowly negative depiction can help get people to think about the threats to security and privacy. We need to consider these threats carefully as we move toward a cloud-computing ecosystem.
INDEX TERMS
cloud computing, security and privacy, cybercrime, virtual machines
CITATION
Marjory S. Blumenthal, "Hide and Seek in the Cloud", IEEE Security & Privacy, vol. 8, no. , pp. 57-58, March/April 2010, doi:10.1109/MSP.2010.70
88 ms
(Ver 3.3 (11022016))