Reflecting on Whether Checklists Can Tick the Box for Cloud Security.
Bob DuncanMark WhittingtonPublished in: CloudCom (2014)
Keyphrases
- cloud computing
- information security
- cloud computing environment
- cloud storage
- security issues
- security policies
- databases
- security threats
- access control
- intrusion detection
- statistical databases
- information assurance
- computer security
- network security
- security requirements
- database
- computing infrastructure
- cloud services
- security problems
- security systems
- data center
- cyber security
- data security
- security model
- security protocols
- security analysis
- e government
- database systems
- security mechanisms
- security vulnerabilities
- social networks
- functional requirements