The Final Frontier: Confidentiality and Privacy in the Cloud
The boundary between the trusted inside and the untrusted outside blurs when a company adopts cloud computing. The organization's applications and data are no longer onsite, fundamentally changing the definition of a malicious insider.
Main Author: | |
---|---|
Other Authors: | , |
Format: | book |
Language: | por |
Published: |
2012
|
Subjects: | |
Online Access: | http://hdl.handle.net/10174/4724 |
Country: | Portugal |
Oai: | oai:dspace.uevora.pt:10174/4724 |
Summary: | The boundary between the trusted inside and the untrusted outside blurs when a company adopts cloud computing. The organization's applications and data are no longer onsite, fundamentally changing the definition of a malicious insider. |
---|