The Trusted Cloud: Addressing Security and Compliance

  • Yeluri R
  • Castro-Leon E
N/ACitations
Citations of this article
12Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

In Chapter 1 we reviewed the essential cloud concepts and took a first look at cloud security. We noted that the traditional notion of perimeter or endpoint protection left much to be desired in the traditional architecture with enterprise-owned assets. Such a notion is even less adequate today when we add the challenges that application developers, service providers, application architects, data center operators, and users face in the emerging cloud environment.

Cite

CITATION STYLE

APA

Yeluri, R., & Castro-Leon, E. (2014). The Trusted Cloud: Addressing Security and Compliance. In Building the Infrastructure for Cloud Security (pp. 19–36). Apress. https://doi.org/10.1007/978-1-4302-6146-9_2

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free