首页> 外文期刊>International journal of electronic governance >Security policy rules and required procedures for two crucial cloud computing threats
【24h】

Security policy rules and required procedures for two crucial cloud computing threats

机译:针对两个关键云计算威胁的安全策略规则和必需的过程

获取原文
获取原文并翻译 | 示例
           

摘要

Cloud computing is the most accurate paradigm of next generation internet-based distributed computing systems providing an innovative business model for organisations. It offers potential benefits including cost savings, flexibility and improved business outcomes for organisations. Despite the potential advantages of cloud computing, security is one of the major issues remaining questionable, in this paper, two crucial security threats of cloud computing systems are presented and are assigned to one of four categories of our security policy. We facilitate both users and providers to know about these security threats and we propose security metrics that providers could use to evaluate the security of their services. Finally, the necessary policy rules and required procedures are described. Our approach tackles the cloud security issues providing guidance in the form of a set of rules which can be utilised for monitoring the implementation and effectiveness of security controls in cloud environments.
机译:云计算是下一代基于Internet的分布式计算系统的最精确范例,可为组织提供创新的业务模型。它为组织提供了潜在的好处,包括节省成本,灵活性和改进的业务成果。尽管云计算具有潜在的优势,但是安全性仍然是值得怀疑的主要问题之一,在本文中,我们提出了云计算系统的两个关键安全威胁并将其分配给我们安全策略的四类之一。我们使用户和提供商都可以了解这些安全威胁,并提出了可供提供商用来评估其服务安全性的安全指标。最后,描述了必要的策略规则和所需的过程。我们的方法解决了云安全问题,以一组规则的形式提供了指导,可用于监视云环境中安全控制的实施和有效性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号