Loading…
Cloud Security: A Gathering Storm
Users' trust in cloud systems is undermined by the lack of transparency in existing security policies.
Saved in:
Published in: | Communications of the ACM 2014-05, Vol.57 (5), p.70-79 |
---|---|
Main Authors: | , , , |
Format: | Magazinearticle |
Language: | English |
Subjects: | |
Citations: | Items that this one cites |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | |
---|---|
cites | cdi_FETCH-LOGICAL-c245t-29e90ab38ce453c80329a8f863d868e3fd5d15142b8a643e5b56a6016f7a5de63 |
container_end_page | 79 |
container_issue | 5 |
container_start_page | 70 |
container_title | Communications of the ACM |
container_volume | 57 |
creator | NANAVATI, Mihir COLP, Patrick AIELLO, Bill WARFIELD, Andrew |
description | Users' trust in cloud systems is undermined by the lack of transparency in existing security policies. |
doi_str_mv | 10.1145/2593686 |
format | magazinearticle |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_1534533599</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>3330638621</sourcerecordid><originalsourceid>FETCH-LOGICAL-c245t-29e90ab38ce453c80329a8f863d868e3fd5d15142b8a643e5b56a6016f7a5de63</originalsourceid><addsrcrecordid>eNo9j01LxDAURYMoWEfxL1REXFXz0Zcm7oaiozDgYnQd0jTRDp12TNLF_HsjU1xdHhzOuxeha4IfCCnhkYJkXPATlBGAqqgYqU5RhjEmBa4EPUcXIWzTiYFDhm7qfpzafGPN5Lt4eMqX-UrHb-u74SvfxNHvLtGZ032wV3Mu0OfL80f9WqzfV2_1cl0YWkIsqLQS64YJY0tgRmBGpRZOcNYKLixzLbQESEkboXnJLDTANceEu0pDazlboNujd-_Hn8mGqLbj5If0UhFgyclAykTdHynjxxC8dWrvu532B0Ww-tuv5v2JvJt9OhjdO68H04V_nAoAilOTXw4eVe0</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>magazinearticle</recordtype><pqid>1534533599</pqid></control><display><type>magazinearticle</type><title>Cloud Security: A Gathering Storm</title><source>EBSCOhost Business Source Ultimate</source><source>Association for Computing Machinery:Jisc Collections:ACM OPEN Journals 2023-2025 (reading list)</source><creator>NANAVATI, Mihir ; COLP, Patrick ; AIELLO, Bill ; WARFIELD, Andrew</creator><creatorcontrib>NANAVATI, Mihir ; COLP, Patrick ; AIELLO, Bill ; WARFIELD, Andrew</creatorcontrib><description>Users' trust in cloud systems is undermined by the lack of transparency in existing security policies.</description><identifier>ISSN: 0001-0782</identifier><identifier>EISSN: 1557-7317</identifier><identifier>DOI: 10.1145/2593686</identifier><identifier>CODEN: CACMA2</identifier><language>eng</language><publisher>New York, NY: Association for Computing Machinery</publisher><subject>Applied sciences ; Cloud computing ; Computer science; control theory; systems ; Data integrity ; Economies of scale ; Exact sciences and technology ; Memory and file management (including protection and security) ; Memory organisation. Data processing ; Software ; Virtualization</subject><ispartof>Communications of the ACM, 2014-05, Vol.57 (5), p.70-79</ispartof><rights>2015 INIST-CNRS</rights><rights>Copyright Association for Computing Machinery May 2014</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c245t-29e90ab38ce453c80329a8f863d868e3fd5d15142b8a643e5b56a6016f7a5de63</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>776,780,27904</link.rule.ids><backlink>$$Uhttp://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&idt=28552064$$DView record in Pascal Francis$$Hfree_for_read</backlink></links><search><creatorcontrib>NANAVATI, Mihir</creatorcontrib><creatorcontrib>COLP, Patrick</creatorcontrib><creatorcontrib>AIELLO, Bill</creatorcontrib><creatorcontrib>WARFIELD, Andrew</creatorcontrib><title>Cloud Security: A Gathering Storm</title><title>Communications of the ACM</title><description>Users' trust in cloud systems is undermined by the lack of transparency in existing security policies.</description><subject>Applied sciences</subject><subject>Cloud computing</subject><subject>Computer science; control theory; systems</subject><subject>Data integrity</subject><subject>Economies of scale</subject><subject>Exact sciences and technology</subject><subject>Memory and file management (including protection and security)</subject><subject>Memory organisation. Data processing</subject><subject>Software</subject><subject>Virtualization</subject><issn>0001-0782</issn><issn>1557-7317</issn><fulltext>true</fulltext><rsrctype>magazinearticle</rsrctype><creationdate>2014</creationdate><recordtype>magazinearticle</recordtype><recordid>eNo9j01LxDAURYMoWEfxL1REXFXz0Zcm7oaiozDgYnQd0jTRDp12TNLF_HsjU1xdHhzOuxeha4IfCCnhkYJkXPATlBGAqqgYqU5RhjEmBa4EPUcXIWzTiYFDhm7qfpzafGPN5Lt4eMqX-UrHb-u74SvfxNHvLtGZ032wV3Mu0OfL80f9WqzfV2_1cl0YWkIsqLQS64YJY0tgRmBGpRZOcNYKLixzLbQESEkboXnJLDTANceEu0pDazlboNujd-_Hn8mGqLbj5If0UhFgyclAykTdHynjxxC8dWrvu532B0Ww-tuv5v2JvJt9OhjdO68H04V_nAoAilOTXw4eVe0</recordid><startdate>20140501</startdate><enddate>20140501</enddate><creator>NANAVATI, Mihir</creator><creator>COLP, Patrick</creator><creator>AIELLO, Bill</creator><creator>WARFIELD, Andrew</creator><general>Association for Computing Machinery</general><scope>IQODW</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>JQ2</scope></search><sort><creationdate>20140501</creationdate><title>Cloud Security: A Gathering Storm</title><author>NANAVATI, Mihir ; COLP, Patrick ; AIELLO, Bill ; WARFIELD, Andrew</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c245t-29e90ab38ce453c80329a8f863d868e3fd5d15142b8a643e5b56a6016f7a5de63</frbrgroupid><rsrctype>magazinearticle</rsrctype><prefilter>magazinearticle</prefilter><language>eng</language><creationdate>2014</creationdate><topic>Applied sciences</topic><topic>Cloud computing</topic><topic>Computer science; control theory; systems</topic><topic>Data integrity</topic><topic>Economies of scale</topic><topic>Exact sciences and technology</topic><topic>Memory and file management (including protection and security)</topic><topic>Memory organisation. Data processing</topic><topic>Software</topic><topic>Virtualization</topic><toplevel>online_resources</toplevel><creatorcontrib>NANAVATI, Mihir</creatorcontrib><creatorcontrib>COLP, Patrick</creatorcontrib><creatorcontrib>AIELLO, Bill</creatorcontrib><creatorcontrib>WARFIELD, Andrew</creatorcontrib><collection>Pascal-Francis</collection><collection>CrossRef</collection><collection>ProQuest Computer Science Collection</collection><jtitle>Communications of the ACM</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>NANAVATI, Mihir</au><au>COLP, Patrick</au><au>AIELLO, Bill</au><au>WARFIELD, Andrew</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Cloud Security: A Gathering Storm</atitle><jtitle>Communications of the ACM</jtitle><date>2014-05-01</date><risdate>2014</risdate><volume>57</volume><issue>5</issue><spage>70</spage><epage>79</epage><pages>70-79</pages><issn>0001-0782</issn><eissn>1557-7317</eissn><coden>CACMA2</coden><abstract>Users' trust in cloud systems is undermined by the lack of transparency in existing security policies.</abstract><cop>New York, NY</cop><pub>Association for Computing Machinery</pub><doi>10.1145/2593686</doi><tpages>10</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0001-0782 |
ispartof | Communications of the ACM, 2014-05, Vol.57 (5), p.70-79 |
issn | 0001-0782 1557-7317 |
language | eng |
recordid | cdi_proquest_journals_1534533599 |
source | EBSCOhost Business Source Ultimate; Association for Computing Machinery:Jisc Collections:ACM OPEN Journals 2023-2025 (reading list) |
subjects | Applied sciences Cloud computing Computer science control theory systems Data integrity Economies of scale Exact sciences and technology Memory and file management (including protection and security) Memory organisation. Data processing Software Virtualization |
title | Cloud Security: A Gathering Storm |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-21T16%3A51%3A02IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Cloud%20Security:%20A%20Gathering%20Storm&rft.jtitle=Communications%20of%20the%20ACM&rft.au=NANAVATI,%20Mihir&rft.date=2014-05-01&rft.volume=57&rft.issue=5&rft.spage=70&rft.epage=79&rft.pages=70-79&rft.issn=0001-0782&rft.eissn=1557-7317&rft.coden=CACMA2&rft_id=info:doi/10.1145/2593686&rft_dat=%3Cproquest_cross%3E3330638621%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c245t-29e90ab38ce453c80329a8f863d868e3fd5d15142b8a643e5b56a6016f7a5de63%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=1534533599&rft_id=info:pmid/&rfr_iscdi=true |