The Final Frontier: Confidentiality and Privacy in the Cloud
The boundary between the trusted inside and the untrusted outside blurs when a company adopts cloud computing. The organization's applications and data are no longer onsite, fundamentally changing the definition of a malicious insider.
Autor principal: | |
---|---|
Outros Autores: | , |
Formato: | book |
Idioma: | por |
Publicado em: |
2012
|
Assuntos: | |
Texto completo: | http://hdl.handle.net/10174/4724 |
País: | Portugal |
Oai: | oai:dspace.uevora.pt:10174/4724 |
Resumo: | The boundary between the trusted inside and the untrusted outside blurs when a company adopts cloud computing. The organization's applications and data are no longer onsite, fundamentally changing the definition of a malicious insider. |
---|