Page 999 - Cloud computing: From paradigm to operation
P. 999
Security 7
Table of Contents
1 Scope
2 References
3 Definitions
3.1 Terms defined elsewhere
3.2 Terms defined in this Recommendation
4 Abbreviations and acronyms
5 Conventions
6 Overview
7 Scope of monitoring data for cloud computing
8 Monitoring data lifecycle in cloud computing
8.1 Monitoring data collection
8.2 Monitoring data storage
8.3 Monitoring data use
8.4 Monitoring data migration
8.5 Monitoring data analysis
8.6 Monitoring data presentation
8.7 Monitoring data destruction
8.8 Monitoring data backup
9 Security threats and challenges for monitoring data of cloud computing
9.1 Security threats and challenges in monitoring data collection stage
9.2 Security threats and challenges in monitoring data storage stage
9.3 Security threats and challenges in monitoring data use stage
9.4 Security threats and challenges in monitoring data migration stage
9.5 Security threats and challenges in monitoring data analysis stage
9.6 Security threats and challenges in monitoring data presentation stage
9.7 Security threats and challenges in monitoring data destruction stage
9.8 Security threats and challenges in monitoring data backup stage
10 Security requirements for monitoring data of cloud computing
10.1 Security requirements for monitoring data collection
10.2 Security requirements for monitoring data storage
10.3 Security requirements for monitoring data use
10.4 Security requirements for monitoring data migration
10.5 Security requirements for monitoring data analysis
10.6 Security requirements for monitoring data presentation
10.7 Security requirements for monitoring data destruction
10.8 Security requirements for monitoring data backup
Bibliography
991