{"title":"云场景中的安全性和信任","authors":"M. Fugini, G. Hadjichristofi","doi":"10.1109/IWSSCLOUD.2011.6049021","DOIUrl":null,"url":null,"abstract":"Nowadays Cloud computing has introduced a new paradigm in distributed services, enabling the provision of services or computational resources to remote entities with no need to have them in house. In this paper, we consider two real life scenarios; 1) risk management in work areas, and 2) the execution of scientific experiments in cooperation among various computation nodes. We investigate how we can leverage Cloud capabilities and extend the aforementioned scenarios to the Cloud. We define the role of the Cloud in these scenarios and identify new dynamics between the Cloud and the services. Through these extensions, we identify security issues and vulnerabilities that need to be addressed. We describe some preliminary directions for security on the Cloud.","PeriodicalId":396741,"journal":{"name":"2011 1st International Workshop on Securing Services on the Cloud (IWSSC)","volume":"418 ","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"Security and trust in Cloud scenarios\",\"authors\":\"M. Fugini, G. Hadjichristofi\",\"doi\":\"10.1109/IWSSCLOUD.2011.6049021\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Nowadays Cloud computing has introduced a new paradigm in distributed services, enabling the provision of services or computational resources to remote entities with no need to have them in house. In this paper, we consider two real life scenarios; 1) risk management in work areas, and 2) the execution of scientific experiments in cooperation among various computation nodes. We investigate how we can leverage Cloud capabilities and extend the aforementioned scenarios to the Cloud. We define the role of the Cloud in these scenarios and identify new dynamics between the Cloud and the services. Through these extensions, we identify security issues and vulnerabilities that need to be addressed. We describe some preliminary directions for security on the Cloud.\",\"PeriodicalId\":396741,\"journal\":{\"name\":\"2011 1st International Workshop on Securing Services on the Cloud (IWSSC)\",\"volume\":\"418 \",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2011-10-20\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2011 1st International Workshop on Securing Services on the Cloud (IWSSC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IWSSCLOUD.2011.6049021\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 1st International Workshop on Securing Services on the Cloud (IWSSC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IWSSCLOUD.2011.6049021","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Nowadays Cloud computing has introduced a new paradigm in distributed services, enabling the provision of services or computational resources to remote entities with no need to have them in house. In this paper, we consider two real life scenarios; 1) risk management in work areas, and 2) the execution of scientific experiments in cooperation among various computation nodes. We investigate how we can leverage Cloud capabilities and extend the aforementioned scenarios to the Cloud. We define the role of the Cloud in these scenarios and identify new dynamics between the Cloud and the services. Through these extensions, we identify security issues and vulnerabilities that need to be addressed. We describe some preliminary directions for security on the Cloud.