{"title":"云计算中的安全挑战和解决方案","authors":"Eystein Mathisen","doi":"10.1109/DEST.2011.5936627","DOIUrl":null,"url":null,"abstract":"This paper provides a brief introduction to the cloud computing platform and the services it provides. In particular, we intend to discuss some of the key security issues that cloud computing are bound to be confronted with, as well as current implementations that provides a solution to these vulnerabilities. In this paper we have discussed policy, software- and hardware security.","PeriodicalId":297420,"journal":{"name":"5th IEEE International Conference on Digital Ecosystems and Technologies (IEEE DEST 2011)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"96","resultStr":"{\"title\":\"Security challenges and solutions in cloud computing\",\"authors\":\"Eystein Mathisen\",\"doi\":\"10.1109/DEST.2011.5936627\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper provides a brief introduction to the cloud computing platform and the services it provides. In particular, we intend to discuss some of the key security issues that cloud computing are bound to be confronted with, as well as current implementations that provides a solution to these vulnerabilities. In this paper we have discussed policy, software- and hardware security.\",\"PeriodicalId\":297420,\"journal\":{\"name\":\"5th IEEE International Conference on Digital Ecosystems and Technologies (IEEE DEST 2011)\",\"volume\":\"67 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2011-06-30\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"96\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"5th IEEE International Conference on Digital Ecosystems and Technologies (IEEE DEST 2011)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/DEST.2011.5936627\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"5th IEEE International Conference on Digital Ecosystems and Technologies (IEEE DEST 2011)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/DEST.2011.5936627","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Security challenges and solutions in cloud computing
This paper provides a brief introduction to the cloud computing platform and the services it provides. In particular, we intend to discuss some of the key security issues that cloud computing are bound to be confronted with, as well as current implementations that provides a solution to these vulnerabilities. In this paper we have discussed policy, software- and hardware security.