dc.contributor.author |
Ramgovind, S.
|
|
dc.contributor.author |
Eloff, M.M.
|
|
dc.contributor.author |
Smith, E.
|
|
dc.date.accessioned |
2010-12-03T11:53:02Z |
|
dc.date.available |
2010-12-03T11:53:02Z |
|
dc.date.issued |
2010-08-02 |
|
dc.identifier.isbn |
978-1-4244-5493-8 |
|
dc.identifier.uri |
http://hdl.handle.net/10500/3883 |
|
dc.description |
Paper presented at Information Security for South Africa (ISSA), 2-4 Aug, Sandton, Johannesburg |
|
dc.description.abstract |
Cloud computing has elevated IT to newer limits by offering the market environment data storage and capacity with flexible scalable computing processing power to match elastic demand and supply, whilst reducing capital expenditure. However the opportunity cost of the successful implementation of Cloud computing is to effectively manage the security in the cloud applications. Security consciousness and concerns arise as soon as one begins to run applications beyond the designated firewall and move closer towards the public domain. The purpose of the paper is to provide an overall security perspective of Cloud computing with the aim to highlight the security concerns that should be properly addressed and managed to realize the full potential of Cloud computing. Gartner's list on cloud security issues, as well the findings from the International Data Corporation enterprise panel survey based on cloud threats, will be discussed in this paper. |
en |
dc.language.iso |
en |
en |
dc.publisher |
Information Security for South Africa |
en |
dc.subject |
Computer network security |
en |
dc.subject |
Authorisation |
en |
dc.subject |
Internet |
en |
dc.subject |
Cloud computing |
en |
dc.subject |
Hybrid cloud |
en |
dc.subject |
Policies |
en |
dc.subject |
Security |
|
dc.subject |
Private Cloud |
|
dc.title |
The management of security in cloud computing |
en |
dc.type |
Article |
en |