Abstract :
Combining the various methods of securing the cloud infrastructure, services, and content can help meet or exceed the protection benefits of a traditional enterprise perimeter.
Keywords :
cloud computing; security of data; cloud infrastructure; cloud security; cloud services; enterprise perimeter; Cloud computing; Computer architecture; Encryption; Firewalls (computing); Logic gates; cloud; cloud computing; cloud infrastructure; cloud providers; cloud services; enterprise perimeter; session containers;