2011
DOI: 10.6028/nist.sp.800-144
|View full text |Cite
|
Sign up to set email alerts
|

Guidelines on security and privacy in public cloud computing

Abstract: The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) promotes the U.S. economy and public welfare by providing technical leadership for the Nation's measurement and standards infrastructure. ITL develops tests, test methods, reference data, proof of concept implementations, and technical analysis to advance the development and productive use of information technology.ITL's responsibilities include the development of technical, physical, administrative, and ma… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
272
0
22

Year Published

2012
2012
2019
2019

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 447 publications
(294 citation statements)
references
References 39 publications
(55 reference statements)
0
272
0
22
Order By: Relevance
“…NIST в своей специальной публикации [7] выделяет три модели облачных вычислений: инфраструктура как сервис (IaaS), платформа как сервис (PaaS) и программное обеспечение как сервис (SaaS); при этом для каждого типа управление данными меняется.…”
Section: обеспечение информационной безопасности облачных вычисленийunclassified
See 1 more Smart Citation
“…NIST в своей специальной публикации [7] выделяет три модели облачных вычислений: инфраструктура как сервис (IaaS), платформа как сервис (PaaS) и программное обеспечение как сервис (SaaS); при этом для каждого типа управление данными меняется.…”
Section: обеспечение информационной безопасности облачных вычисленийunclassified
“…Однако провайдеры не спешат брать на себя ответственность за безопасность данных [6]. При передаче данных в облако владелец практически лишается возможности контролировать их безопасность [7].…”
Section: Introductionunclassified
“…Security in cloud-based systems is frequently mismanaged -in order to maximize effectiveness while also minimizing costs as well as the risk of security breaches, security and privacy must be considered from the initial planning stage at the beginning of the system development life-cycle. Addressing security issues after implementation and deployment is not only much more difficult and expensive, but also considerably riskier [10].…”
Section: Related Workmentioning
confidence: 99%
“…In order to analyse the management of IT controls in a cloud environment, it is necessary to evaluate cloud computing deployment and services models. The management of computational resources in an organisation is broadly characterised by the cloud deployment model adopted by the organisation (Jansen & Grance, 2011). A variety of deployment models of cloud services have evolved in the marketplace (Krieger, McGachey, & Kanevsky, 2010;Vanmechelen, Depoorter, & Broeckhove, 2011;Venkatraman, 2013), with public, private, hybrid and community cloud deployment models being the most popular ones.…”
Section: Cloud Computing Deployment and Service Modelsmentioning
confidence: 99%