首页> 外文期刊>Inside R & D >Virtualization of End-To-End Application Security in the Cloud
【24h】

Virtualization of End-To-End Application Security in the Cloud

机译:云中端到端应用程序安全性的虚拟化

获取原文
获取原文并翻译 | 示例
           

摘要

Security engineering-in order to be effective-must be incorporated in all phases of application specification and development. Doing this suitably is more and more critical as organisations outsource their services to cloud providers. Elementary boundaries of data ownership and administrative responsibilities render distributed systems and cloud systems, extremely complex and vulnerable for security threats. The cloud providers are expected to sequester each of their clients from others, for better security. They are also expected to have methods to isolate modules and users within each client's application, ensuring no compromise of cloud security. Each cloud client provides one or more services, accessed by many users. The cloud provider is anticipated to make sure that its users' data remains private, even when managed by threads sharing a service's address space. Effective isolation is perceived to be the solution for implementing an efficient end-to-end application cloud security.
机译:为了有效,安全工程必须纳入应用程序规范和开发的所有阶段。随着组织将服务外包给云提供商,适当地做到这一点变得越来越重要。数据所有权和管理职责的基本界限使分布式系统和云系统变得极为复杂,并且容易受到安全威胁的影响。希望云提供商将他们的每个客户与其他客户隔离开,以提高安全性。他们还希望它们具有隔离每个客户端应用程序中的模块和用户的方法,以确保不损害云安全性。每个云客户端提供一项或多项服务,许多用户可以访问。期望云提供商即使在由共享服务地址空间的线程进行管理时,也要确保其用户数据保持私有。有效的隔离被视为实现有效的端到端应用程序云安全性的解决方案。

著录项

  • 来源
    《Inside R & D》 |2012年第42期|2-3|共2页
  • 作者

    Jean Bacon;

  • 作者单位

    University of Cambridge, JJ Thompson Avenue, Cambridge CB3 OFD, UK;

  • 收录信息
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号