Authors
Brian Hay, Kara Nance, Matt Bishop
Publication date
2011/1/4
Conference
2011 44th Hawaii International Conference on System Sciences
Pages
1-7
Publisher
IEEE
Description
Securing our digital assets has become increasingly challenging as our reliance on rapidly evolving technologies continues to grow. The security perimeter in computing has changed from a well-defined boundary that was relatively easy to identify and defend, to an elastic boundary that is constantly changing and for which the threats are constantly evolving. This paper investigates the complex security challenges that are introduced by the trend towards Infrastructure as a Service (IaaS)-based cloud computing. While not exhaustive, it identifies some technological and legal issues and concerns from the perspectives of identified stakeholders, and suggests some future directions for security research and development to help advance the security posture of this technology.
Total citations
20112012201320142015201620172018201920202021202220232024102022321716211611891185
Scholar articles
B Hay, K Nance, M Bishop - 2011 44th Hawaii International Conference on System …, 2011