Back to Results
First PageMeta Content
Cloud communications / Cloud API / Web hosting service / Data center / Hosted service provider / IICCRD / Integrated Cloud Service Management / Computing / Cloud computing / Centralized computing


Self Hosting vs. Cloud Hosting: Accounting for the security impact of hosting in the cloud David Molnar, Stuart Schechter Microsoft Research {DMolnar,StuS}@microsoft.com
Add to Reading List

Document Date: 2010-05-26 10:13:24


Open Document

File Size: 251,66 KB

Share Result on Facebook

City

Attestation / Underprovisioning Attestation / /

Company

AES / UBS / Amazon / Alteratively / Oracle / Google / Facebook / Cisco / Spamhaus / Intel / Microsoft / /

Country

United States / /

/

Event

Reorganization / /

IndustryTerm

Resource accounting modules / cloud providers solutions / insurance contract / remote hardware/software attestation / basic web presence / where their applications / dedicated hosting infrastructure / tenant software / Software infrastructure / cloud-infrastructure / software tools / specified hardware / myriad authentication solutions / application-level infrastructure / technology fail / cloud applications / test infrastructure / formal tools / software developer / control networks / owned infrastructure / target applications / Human infrastructure / Tenant auditing / swamp computing / web hosting providers / appropriate fairness algorithms / software stack / Insurance policies / Secret search / cloud infrastructure / financial transaction processing / organizations’ applications / resource accounting / virtual private networks / bank / law enforcement access / attestation chain / virtual private server / search warrants / stakes applications / banking / intra-cloud communications / attestation-based auditing solutions / time auditing equipment / physical infrastructure / law enforcement / computing / certain data-intensive applications / cloud computing / sealed search warrant / cloud infrastructure services / external reputation systems / database services / storage services / cloud computing threats / /

NaturalFeature

Side channel / /

OperatingSystem

VMs / /

Organization

Federal Bureau of Investigation / Justice Department’s office of the Inspector General / United States Navy / /

Person

Ron Rivest / John Chambers / Bruce Schneier / Stuart Schechter / /

Position

second administrator / auditor / King / CEO / software developer / /

Product

EC2 service / Amazon EC2 / /

Technology

appropriate fairness algorithms / API / disk encryption / existing network protocols / encryption / memory encryption / service level agreement / network protocols / /

SocialTag