Overlay Architectures Enabling Cloud Computing for Multi-level Security Environments.
Christopher C. LambGregory L. HeilemanPublished in: SERVICES (2012)
Keyphrases
- cloud computing
- security issues
- cloud computing environment
- cloud storage
- data privacy
- computing resources
- remote attestation
- identity management
- computing infrastructure
- trusted computing
- distributed computing
- cloud services
- data center
- network access
- middleware architecture
- data management
- service providers
- security mechanisms
- big data
- cloud computing platform
- computing technologies
- business models
- access control
- information security
- computing platform
- load balancing
- computing environments
- intrusion detection
- cloud platform
- cloud infrastructure
- databases
- open architecture
- network security
- service level agreements
- virtual machine
- commodity hardware
- security policies
- metadata