Security checklist for IaaS cloud deployments.
Mihály HéderF. BisztrayGy. LakatosG. MalasitsP. OrmosE. Prunk-ÉgerJ. RigóSzabolcs TenczerErno RigóPublished in: CoRR (2016)
Keyphrases
- security requirements
- cloud computing
- information security
- security problems
- access control
- security model
- security policies
- security mechanisms
- data center
- cloud computing environment
- cloud storage
- virtual machine
- business models
- computing platform
- service providers
- data management
- security issues
- design considerations
- cloud services
- data mining
- network security
- intrusion detection
- security measures