Page 999 - Cloud computing: From paradigm to operation
P. 999

Security                                                   7


                                                    Table of Contents

            1     Scope
            2     References

            3     Definitions
                  3.1   Terms defined elsewhere
                  3.2   Terms defined in this Recommendation
            4     Abbreviations and acronyms

            5     Conventions
            6     Overview

            7     Scope of monitoring data for cloud computing
            8     Monitoring data lifecycle in cloud computing
                  8.1   Monitoring data collection

                  8.2   Monitoring data storage
                  8.3   Monitoring data use
                  8.4   Monitoring data migration
                  8.5   Monitoring data analysis
                  8.6   Monitoring data presentation
                  8.7   Monitoring data destruction

                  8.8   Monitoring data backup
            9     Security threats and challenges for monitoring data of cloud computing
                  9.1   Security threats and challenges in monitoring data collection stage
                  9.2   Security threats and challenges in monitoring data storage stage

                  9.3   Security threats and challenges in monitoring data use stage
                  9.4   Security threats and challenges in monitoring data migration stage
                  9.5   Security threats and challenges in monitoring data analysis stage
                  9.6   Security threats and challenges in monitoring data presentation stage
                  9.7   Security threats and challenges in monitoring data destruction stage
                  9.8   Security threats and challenges in monitoring data backup stage

            10    Security requirements for monitoring data of cloud computing
                  10.1  Security requirements for monitoring data collection
                  10.2  Security requirements for monitoring data storage
                  10.3  Security requirements for monitoring data use

                  10.4  Security requirements for monitoring data migration
                  10.5  Security requirements for monitoring data analysis
                  10.6  Security requirements for monitoring data presentation
                  10.7  Security requirements for monitoring data destruction
                  10.8  Security requirements for monitoring data backup

            Bibliography





                                                                                                         991
   994   995   996   997   998   999   1000   1001   1002   1003   1004