Page 802 - Cloud computing: From paradigm to operation
P. 802

5                                            Intercloud and interoperability


                  11.2  Level of robustness

                  11.3  Security policy negotiation
                  11.4  Security and confidentiality policy
                  11.5  Data security
                  11.6  Security policy monitoring
            12    Security considerations
            Appendix I – Use case of trusted inter-cloud computing

                  I.1   Use case template
                  I.2   Trusted inter-cloud related use cases
            Bibliography







































































            794
   797   798   799   800   801   802   803   804   805   806   807