dc.contributor.author | Zhao, Gansen | |
dc.contributor.author | Chunming, Rong | |
dc.contributor.author | Jaatun, Martin Gilje | |
dc.contributor.author | Sandnes, Frode Eika | |
dc.date.accessioned | 2010-11-08T12:21:49Z | |
dc.date.available | 2010-11-08T12:21:49Z | |
dc.date.issued | 2010-08 | |
dc.identifier.citation | Zhao, G., Rong, C., Jaatun, M.G. & Sandnes, F.E. (2010). Deployment models: Towards eliminating security concerns from cloud computing. In: F. Bodin (Ed.), International Conference on High Performance Computing and Simulation. Piscataway, N.J. : Institute of Electrical and Electronics Engineers | en_US |
dc.identifier.isbn | 978-1-4244-6827-0 | |
dc.identifier.uri | https://hdl.handle.net/10642/500 | |
dc.description.abstract | Cloud computing has become a popular choice as an
alternative to investing new IT systems. When making
decisions on adopting cloud computing related solutions,
security has always been a major concern. This article
summarizes security concerns in cloud computing and
proposes five service deployment models to ease these
concerns. The proposed models provide different security
related features to address different requirements and
scenarios and can serve as reference models for
deployment. | en_US |
dc.language.iso | eng | en_US |
dc.publisher | IEEE Computer Society | en_US |
dc.subject | Cloud computing | en_US |
dc.subject | Deployment models | en_US |
dc.subject | Security concerns | en_US |
dc.subject | Cloud security | en_US |
dc.subject | VDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550::Datateknologi: 551 | en_US |
dc.title | Deployment Models: Towards Eliminating Security Concerns From Cloud Computing | en_US |
dc.type | Chapter | en_US |
dc.type | Peer reviewed | en_US |
dc.identifier.doi | http://dx.doi.org/10.1109/HPCS.2010.5547137 | |