Cargando…

The cloud : understanding the security, privacy and trust challenges /

This report discusses how policy-makers might address the challenges and risks in respect of the security, privacy and trust aspects of cloud computing that could undermine the attainment of broader economic and societal objectives across Europe.

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Robinson, Neil, 1964-
Autores Corporativos: Rand Corporation, European Commission. Information Society DG
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Santa Monica : Rand, 2011.
Colección:Technical report (Rand Corporation) ; TR-933-EC.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000Ma 4500
001 JSTOROA_ocn769190544
003 OCoLC
005 20231005004200.0
006 m o d
007 cr cn|||||||||
008 111211s2011 cau ob 000 0 eng d
040 |a E7B  |b eng  |e pn  |c E7B  |d OCLCO  |d DEBSZ  |d OCLCQ  |d OCLCA  |d YDXCP  |d EBLCP  |d EDX  |d JSTOR  |d TEFOD  |d N$T  |d AU@  |d OCLCA  |d TEFOD  |d OCLCQ  |d AZK  |d LOA  |d AGLDB  |d CNNOR  |d MOR  |d Z5A  |d PIFAG  |d ZCU  |d MERUC  |d OCLCQ  |d JBG  |d OCLCQ  |d LND  |d VFL  |d U3W  |d OCLCA  |d ICG  |d OCLCF  |d STF  |d WRM  |d VTS  |d ICN  |d NRAMU  |d INT  |d VT2  |d EZ9  |d ERL  |d OCLCQ  |d G3B  |d TKN  |d OCLCQ  |d DKC  |d CNTRU  |d OCLCQ  |d NJT  |d OCLCQ  |d OCL  |d VLY  |d AJS  |d OCLCO  |d OCLCQ  |d OCLCO  |d FUT 
019 |a 780425716  |a 842279178  |a 880747024  |a 961512493  |a 962669339  |a 1162390545 
020 |a 0833059602 
020 |a 9780833059604 
020 |a 9780833059581  |q (electronic bk.) 
020 |a 0833059580  |q (electronic bk.) 
020 |z 9780833059604 
020 |a 1280126949 
020 |a 9781280126949 
020 |a 9786613530806 
020 |a 6613530808 
029 1 |a AU@  |b 000050896787 
029 1 |a AU@  |b 000051319180 
029 1 |a AU@  |b 000052892147 
029 1 |a DEBBG  |b BV044160369 
029 1 |a DEBSZ  |b 372886442 
029 1 |a DEBSZ  |b 397190549 
029 1 |a DEBSZ  |b 472584197 
029 1 |a GBVCP  |b 1008656380 
029 1 |a NZ1  |b 14699027 
035 |a (OCoLC)769190544  |z (OCoLC)780425716  |z (OCoLC)842279178  |z (OCoLC)880747024  |z (OCoLC)961512493  |z (OCoLC)962669339  |z (OCoLC)1162390545 
037 |a 22573/ctt3n24s  |b JSTOR 
037 |a 25A4ADF2-3B12-43FC-A159-1568B3C850A6  |b OverDrive, Inc.  |n http://www.overdrive.com 
043 |a e------ 
050 4 |a QA76.585  |b .R635 2011eb 
072 7 |a COM060040  |2 bisacsh 
072 7 |a LAW105000  |2 bisacsh 
072 7 |a LAW  |x 018000  |2 bisacsh 
072 7 |a LAW  |x 075000  |2 bisacsh 
082 0 4 |a 342.40858 
049 |a UAMI 
100 1 |a Robinson, Neil,  |d 1964- 
245 1 4 |a The cloud :  |b understanding the security, privacy and trust challenges /  |c Neil Robinson [and others]. 
260 |a Santa Monica :  |b Rand,  |c 2011. 
300 |a 1 online resource (xii, 122 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a data file  |2 rda 
490 1 |a Technical report ;  |v [TR-933-EC] 
500 |a "Sponsored by the European Commission Directorate General Information Society and Media." 
504 |a Includes bibliographical references. 
505 0 |a Executive summary -- Synthesis -- ch. 1: Introduction -- ch. 2: Definitions and drivers -- ch. 3: Understanding the implications for security, privacy and trust --ch. 4: Security, privacy and trust challenges stemming from thetechnological underpinnings of cloud computing -- ch. 5: Security, privacy and trust challenges inherent to the legal and regulatory aspects of cloud computing -- ch. 6: Putting it all together: key risks and operational challenges -- ch. 7: Case studies -- ch. 8: Gap analysis -- ch. 9: Solving the challenges: recommendations and actions -- ch. 10: Conclusions -- References -- Appendices. 
505 0 |a Cover; Title Page; Copyright; Preface; Acknowledgements; Contents; Glossary; Executive Summary; Synthesis; Defining cloud computing; Defining security, privacy and trust; Issues arising from the reviewed literature; Risk control frameworks; Operational challenges; Implications from case studies; Gap analysis; Solving the challenges: observations and recommendations; Conclusions; Methodology; Structure of the report; Chapter 1: Introduction; Chapter 2: Definitions and drivers; 2.1 Definitions of cloud computing; 2.2 What's pushing cloud take-up? 
505 8 |a 2.3 The economics of cloud computing: implications for security 2.4 Concluding remarks; Chapter 3: Understanding the implications for security, privacy and trust; 3.1 Defining security, privacy and trust; 3.2 Growing focus on security, privacy and trust concerns; 3.3 Identifying key issues and possible enablers for security, trust and privacy in the cloud; Chapter 4: Security, privacy and trust challenges stemming from thetechnological underpinnings of cloud computing; 4.1 The linchpin of trust: the hypervisor. 
505 8 |a 4.2 Can the distributed models of computation characteristic of grid technology adequately serve the availability and interoperability needs ofcloud computing?; 4.3 Current state-of-the-art web services may not be sufficient to establishinteroperability for identity management in the cloud; 4.4 Trustworthiness in service-orientated architectures (SOAs); 4.5 Will web application frameworks (APIs and SDKs) be credible inproviding trust across distributed environments?; 4.6 The fragility of current encryption approaches in the cloud context; 4.7 Concluding remarks. 
505 8 |a Chapter 5: Security, privacy and trust challenges inherent to the legaland regulatory aspects of cloud computing; 5.1 Horizontal perspective: applicable law and jurisdiction; 5.2 Vertical issues: main applicable laws; 5.3 The will of the parties: contractual provisions; 5.4 Overcoming legal barriers: key tools; 5.5 Concluding remarks; Chapter 6: Putting it all together: key risks and operational challenges; 6.1 Summary of legal and technical issues; 6.2 Migrating to the cloud: the operational challenges; Chapter 7: Case studies; 7.1 Introduction; 7.2 Initial classification of case studies. 
505 8 |a 7.3 Observations on case studies in practice; 7.4 Matrix of case study typology; 7.5 Case Study 1: the Danish National IT and Telecom Agency; 7.6 Case study 2: the City of Los Angeles; 7.7 Case study 3: EU eHealth provider; 7.8 Implications; Chapter8: Gap analysis; Chapter 9: Solving the challenges: recommendations and actions; 9.1 Introduction; 9.2 Recommendations; 9.3 Specific actions; Chapter 10: Conclusions; References; Appendices. 
520 |a This report discusses how policy-makers might address the challenges and risks in respect of the security, privacy and trust aspects of cloud computing that could undermine the attainment of broader economic and societal objectives across Europe. 
546 |a English. 
590 |a JSTOR  |b Books at JSTOR Open Access 
590 |a JSTOR  |b Books at JSTOR All Purchased 
650 0 |a Cloud computing  |x Security measures. 
650 0 |a Computer security. 
650 0 |a Privacy, Right of. 
650 0 |a Information policy  |z European Union countries. 
650 6 |a Infonuagique  |x Sécurité  |x Mesures. 
650 6 |a Sécurité informatique. 
650 6 |a Information  |x Politique gouvernementale  |z Pays de l'Union européenne. 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a LAW  |x Constitutional.  |2 bisacsh 
650 7 |a LAW  |x Public.  |2 bisacsh 
650 7 |a Computer security  |2 fast 
650 7 |a Information policy  |2 fast 
650 7 |a Privacy, Right of  |2 fast 
651 7 |a European Union countries  |2 fast 
710 2 |a Rand Corporation. 
710 2 |a European Commission.  |b Information Society DG. 
776 0 8 |i Print version:  |a Robinson, Neil.  |t Cloud : Understanding the Security, Privacy and Trust Challenges.  |d Santa Monica : RAND Corporation, ©2011 
830 0 |a Technical report (Rand Corporation) ;  |v TR-933-EC. 
856 4 0 |u https://jstor.uam.elogim.com/stable/10.7249/tr933ec  |z Texto completo 
938 |a EBL - Ebook Library  |b EBLB  |n EBL825129 
938 |a ebrary  |b EBRY  |n ebr10516122 
938 |a EBSCOhost  |b EBSC  |n 408758 
938 |a YBP Library Services  |b YANK  |n 7273051 
938 |a YBP Library Services  |b YANK  |n 10861989 
994 |a 92  |b IZTAP