The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
Securing Real-Time Interactive Applications in Federated Clouds
Abstract
Enterprise adoption of cloud computing for real-time interactive applications processes is limited by their ability to meet inter-enterprise security requirements. Although some clouds’ offerings comply with security standards, no solution today allows businesses to assess security compliance of applications at the business level and dynamically link to security countermeasures on-demand. In this chapter we examine cloud security, privacy, and trust issues from three levels: business, jurisdiction, and technical. Firstly, we look at the business level to identify issues arising from the motivations and concerns of business stakeholders. Secondly, we explore jurisdictional level to identify risks that arise from legislation, gaps in legislation, or conflicts between legislation in different jurisdictions related to a cloud deployment, given the concerns of stakeholders. Finally, we examine the technical level to identify issues that arise from technical causes such as ICT vulnerabilities, and/or require technical solutions, such as data confidentiality and integrity protection.
Related Content
Radhika Kavuri, Satya kiranmai Tadepalli.
© 2024.
19 pages.
|
Ramu Kuchipudi, Ramesh Babu Palamakula, T. Satyanarayana Murthy.
© 2024.
10 pages.
|
Nidhi Niraj Worah, Megharani Patil.
© 2024.
21 pages.
|
Vishal Goar, Nagendra Singh Yadav.
© 2024.
23 pages.
|
S. Boopathi.
© 2024.
24 pages.
|
Sai Samin Varma Pusapati.
© 2024.
25 pages.
|
Swapna Mudrakola, Krishna Keerthi Chennam, Shitharth Selvarajan.
© 2024.
11 pages.
|
|
|