In Chapter 1 we reviewed the essential cloud concepts and took a first look at cloud security. We noted that the traditional notion of perimeter or endpoint protection left much to be desired in the traditional architecture with enterprise-owned assets. Such a notion is even less adequate today when we add the challenges that application developers, service providers, application architects, data center operators, and users face in the emerging cloud environment.
CITATION STYLE
Yeluri, R., & Castro-Leon, E. (2014). The Trusted Cloud: Addressing Security and Compliance. In Building the Infrastructure for Cloud Security (pp. 19–36). Apress. https://doi.org/10.1007/978-1-4302-6146-9_2
Mendeley helps you to discover research relevant for your work.