Issue No. 05 - September/October (2010 vol. 8)
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/MSP.2010.149
Gunnar Peterson , Arctec Group
Cloud computing requires a new security model. One promising model employs technology "patterns": gateways, monitoring, security token services, and policy enforcement points. These patterns help promote a healthy "distrust and verify" approach to cloud security.
cloud computing, cloud security, software as a service, platform as a service, infrastructure as a service, infostructure, metastructure, security token services, policy enforcement points, policy decision points, security and privacy
G. Peterson, "Don't Trust. And Verify: A Security Architecture Stack for the Cloud," in IEEE Security & Privacy, vol. 8, no. , pp. 83-86, 2010.