|
Program Systems: Theory and Applications, 2015, Volume 6, Issue 1, Pages 61–71
(Mi ps154)
|
|
|
|
This article is cited in 1 scientific paper (total in 1 paper)
Hardware, software and distributed supercomputer systems
Cloud computing security perimeter
V. I. Vorobiev, S. R. Ryzhkov, R. R. Fatkieva St. Petersburg Institute for Informatics and Automation of RAS
Abstract:
Abstract concept of cloud data sealing by means of determinable policies is proposed.
Use of TPM crypto modules for creation of trusted server platforms within the cloud is described.
Generalized geo tagging scheme is presented. (In Russian).
Key words and phrases:
cloud, cloud computing, security perimeter, geo tagging.
Received: 26.12.2014 Accepted: 24.02.2015
Citation:
V. I. Vorobiev, S. R. Ryzhkov, R. R. Fatkieva, “Cloud computing security perimeter”, Program Systems: Theory and Applications, 6:1 (2015), 61–71
Linking options:
https://www.mathnet.ru/eng/ps154 https://www.mathnet.ru/eng/ps/v6/i1/p61
|
Statistics & downloads: |
Abstract page: | 228 | Full-text PDF : | 89 | References: | 34 |
|