4th IEEE International Conference on Cloud Computing Technology and Science Proceedings 2012
DOI: 10.1109/cloudcom.2012.6427512
|View full text |Cite
|
Sign up to set email alerts
|

Accountability for cloud and other future Internet services

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
32
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 49 publications
(32 citation statements)
references
References 1 publication
0
32
0
Order By: Relevance
“…The administrators of cloud computing are principally concerned with security and compliance (Modi, Patel, Borisaniya, Patel, & Rajarajan, 2013;Puthal et al, 2015). This introduces a number of cloud-related risks and threats (Khan, 2012;Zissis & Lekkas, 2012), thus leading to a shift in the roles of the staff ISACA, 2011;Pearson et al, 2012) in response to such concerns. In order to manage the increasing business and operational risks inherent in a complex global environment, integrated governance risk and compliance has become one of the most important business requirements for organisations (Vicente & da Silva, 2011).…”
Section: Roles and Responsibilities Allocation Factors Specific To Thmentioning
confidence: 99%
See 4 more Smart Citations
“…The administrators of cloud computing are principally concerned with security and compliance (Modi, Patel, Borisaniya, Patel, & Rajarajan, 2013;Puthal et al, 2015). This introduces a number of cloud-related risks and threats (Khan, 2012;Zissis & Lekkas, 2012), thus leading to a shift in the roles of the staff ISACA, 2011;Pearson et al, 2012) in response to such concerns. In order to manage the increasing business and operational risks inherent in a complex global environment, integrated governance risk and compliance has become one of the most important business requirements for organisations (Vicente & da Silva, 2011).…”
Section: Roles and Responsibilities Allocation Factors Specific To Thmentioning
confidence: 99%
“…(VOA) are high in the public cloud environment (Pearson et al, 2012) where services can be used by competing clients and where the number of cloud users is much higher. Other security threats specifically related to the use of virtualisation in cloud computing lead to concerns like Virtual Machine (VM) theft, VM escape (EMC, 2014) and Hyper Jacking (Jasti, Shah, Nagaraj, & Pendse, 2010) to name a few.…”
Section: Roles and Responsibilities Allocation Factors Specific To Thmentioning
confidence: 99%
See 3 more Smart Citations