2014
DOI: 10.1007/978-3-319-06811-4_9
|View full text |Cite
|
Sign up to set email alerts
|

Towards a Risk-Based Approach to Achieving Data Confidentiality in Cloud Computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2015
2015
2019
2019

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 7 publications
0
1
0
Order By: Relevance
“…The business oriented cloud computing services guidelines follows 3 tiered SOA architecture, asynchronous messaging and avoiding cloud specific APIs. The goal of risks aware cloud computing lies in from attempting to increase application metrics to finding a balance between performance and sensitive data disclosure [26]. For risks management in Internet of things, SIGMA project has been used to acquire and integrate heterogeneous data from various sensor networks [27].…”
Section: Risk Management Strategies In Cloud Computingmentioning
confidence: 99%
“…The business oriented cloud computing services guidelines follows 3 tiered SOA architecture, asynchronous messaging and avoiding cloud specific APIs. The goal of risks aware cloud computing lies in from attempting to increase application metrics to finding a balance between performance and sensitive data disclosure [26]. For risks management in Internet of things, SIGMA project has been used to acquire and integrate heterogeneous data from various sensor networks [27].…”
Section: Risk Management Strategies In Cloud Computingmentioning
confidence: 99%