Conference paper
Authors list: Jensen, M.; Schwenk, J.; Bohli, J.-M.; Gruschka, N.; Lo Iacono, L.
Appeared in: 2011 IEEE International Conference on Cloud Computing (CLOUD 2011)
Editor list: Liu, L.
Publication year: 2011
Pages: 565-572
ISBN: 978-1-4577-0836-7
eISBN: 978-0-7695-4460-1
DOI Link: https://doi.org/10.1109/CLOUD.2011.85
Conference: 4th IEEE International Conference on Cloud Computing (CLOUD 2011)
Clouds impose new security challenges, which are amongst the biggest obstacles when considering the usage of cloud services. This triggered a lot of research activities in this direction, resulting in a quantity of proposals targeting the various security threats. Besides the security issues coming with the cloud paradigm, it can also provide a new set of unique features which open the path towards novel security approaches, techniques and architectures. This paper initiates this discussion by contributing a concept which achieves security merits by making use of multiple distinct clouds at the same time.
Abstract:
Citation Styles
Harvard Citation style: Jensen, M., Schwenk, J., Bohli, J., Gruschka, N. and Lo Iacono, L. (2011) Security Prospects through Cloud Computing by Adopting Multiple Clouds, in Liu, L. (ed.) 2011 IEEE International Conference on Cloud Computing (CLOUD 2011). Piscataway, NJ: IEEE. pp. 565-572. https://doi.org/10.1109/CLOUD.2011.85
APA Citation style: Jensen, M., Schwenk, J., Bohli, J., Gruschka, N., & Lo Iacono, L. (2011). Security Prospects through Cloud Computing by Adopting Multiple Clouds. In Liu, L. (Ed.), 2011 IEEE International Conference on Cloud Computing (CLOUD 2011). (pp. 565-572). IEEE. https://doi.org/10.1109/CLOUD.2011.85