DocumentCode
79202
Title
Practical methods for securing the cloud
Author
Amoroso, Edward G.
Volume
1
Issue
1
fYear
2014
fDate
May-14
Firstpage
28
Lastpage
38
Abstract
Combining the various methods of securing the cloud infrastructure, services, and content can help meet or exceed the protection benefits of a traditional enterprise perimeter.
Keywords
cloud computing; security of data; cloud infrastructure; cloud security; cloud services; enterprise perimeter; Cloud computing; Computer architecture; Encryption; Firewalls (computing); Logic gates; cloud; cloud computing; cloud infrastructure; cloud providers; cloud services; enterprise perimeter; session containers;
fLanguage
English
Journal_Title
Cloud Computing, IEEE
Publisher
ieee
ISSN
2325-6095
Type
jour
DOI
10.1109/MCC.2014.17
Filename
6848705
Link To Document