Security Architectures for Cloud Computing

Moving computing into the "Cloud" makes computer processing much more convenient for users but also presents them with new security problems about safety and reliability. To solve these problems, service providers must establish and provide security architectures for Cloud computing. This paper describes domestic and international trends in security requirements for Cloud computing, along with security architectures proposed by Fujitsu such as access protocol, authentication and IDentity (ID) management, and security visualization.

Provided by: Fujitsu Topic: Cloud Date Added: Oct 2010 Format: PDF

Find By Topic