2008
DOI: 10.1016/s1353-4858(08)70140-5
|View full text |Cite
|
Sign up to set email alerts
|

Danger in the clouds

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
14
0
2

Year Published

2011
2011
2017
2017

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 34 publications
(18 citation statements)
references
References 0 publications
0
14
0
2
Order By: Relevance
“…Service governance is essential to provide sustenance to enterprise services [15]. However, it is easier to procure and consume cloud services because their governance challenges are mostly limited to version compatibility [17] and data [18].…”
Section: Background and Related Workmentioning
confidence: 99%
“…Service governance is essential to provide sustenance to enterprise services [15]. However, it is easier to procure and consume cloud services because their governance challenges are mostly limited to version compatibility [17] and data [18].…”
Section: Background and Related Workmentioning
confidence: 99%
“…Information security and its assessment provide a fundamental basis for risk control and management (Mansfield-Devine 2008). Key security concerns for CC include issues such as "privileged user access, regulatory compliance, data location, data segregation, recovery, investigative support, and long-term viability" (Mansfield-Devine 2008).…”
Section: Security and Trust Concernsmentioning
confidence: 99%
“…Key security concerns for CC include issues such as "privileged user access, regulatory compliance, data location, data segregation, recovery, investigative support, and long-term viability" (Mansfield-Devine 2008). Extant study posits that the major factor against CC adoption is the security of business information (Morsy, Grundy, and Muller 2010;Bose, Luo, and Liu 2013).…”
Section: Security and Trust Concernsmentioning
confidence: 99%
“…Recent surveys show that there are different threats in cloud infrastructure-asa-service [3,2]. Seven threats were already identified and characterized [1]: (1) abuse and nefarious use of cloud computing; (2) insecure interfaces and APIs; (3) malicious insiders; (4) shared technology issues; (5) data loss or leakage; (6) account or service hijacking; and (7) unknown security profile.…”
Section: Background and Related Workmentioning
confidence: 99%
“…Infrastructure security is a serious concern in cloud computing [1][2][3]. Cloud providers use various tools to monitor and control the behavior of their computing environment.…”
Section: Introductionmentioning
confidence: 99%