Abstract
Since the inception of cloud computing, security researchers have been active in addressing the question of cloud information security, which has seen the development of a wide range of technical solutions. The same can be said for non-cloud information security research which has been active for a far longer period of time. Yet, year on year, security breaches continue to increase, both in volume and in value. The business architecture of a company comprises people, process and technology. Is it not time to consider a different approach?
Original language | English |
---|---|
Title of host publication | 2015 IEEE 7th International Conference on Cloud Computing Technology and Science (CloudCom) |
Publisher | Institute of Electrical and Electronics Engineers (IEEE) |
Pages | 523-528 |
Number of pages | 6 |
ISBN (Electronic) | 978-1-4673-9560-1 |
ISBN (Print) | 978-1-4673-9561-8 |
DOIs | |
Publication status | Published - 30 Nov 2015 |
Event | 2015 IEEE 7th International Conference on Cloud Computing Technology and Science (CloudCom) - UBC Robson Square Conference Centre, 800 Robson St, Vancouver, BC, Canada, Vancouver, Canada Duration: 30 Nov 2015 → 3 Dec 2015 http://cipsijoomla.ux.uis.no/cloudcom2015/ |
Conference
Conference | 2015 IEEE 7th International Conference on Cloud Computing Technology and Science (CloudCom) |
---|---|
Abbreviated title | CloudCom 2015 |
Country/Territory | Canada |
City | Vancouver |
Period | 30/11/15 → 3/12/15 |
Internet address |
Keywords
- security
- privacy
- standards
- compliance
- assurance
- audit
- measurement
- cloud service providers
- service level agreements
- threat environment