Page 802 - Cloud computing: From paradigm to operation
P. 802
5 Intercloud and interoperability
11.2 Level of robustness
11.3 Security policy negotiation
11.4 Security and confidentiality policy
11.5 Data security
11.6 Security policy monitoring
12 Security considerations
Appendix I – Use case of trusted inter-cloud computing
I.1 Use case template
I.2 Trusted inter-cloud related use cases
Bibliography
794