The cloud :: understanding the security, privacy and trust challenges /
This report discusses how policy-makers might address the challenges and risks in respect of the security, privacy and trust aspects of cloud computing that could undermine the attainment of broader economic and societal objectives across Europe.
Gespeichert in:
1. Verfasser: | |
---|---|
Körperschaften: | , |
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Santa Monica :
Rand,
2011.
|
Schriftenreihe: | Technical report (Rand Corporation) ;
TR-933-EC. |
Schlagworte: | |
Online-Zugang: | DE-862 DE-863 |
Zusammenfassung: | This report discusses how policy-makers might address the challenges and risks in respect of the security, privacy and trust aspects of cloud computing that could undermine the attainment of broader economic and societal objectives across Europe. |
Beschreibung: | "Sponsored by the European Commission Directorate General Information Society and Media." |
Beschreibung: | 1 online resource (xii, 122 pages) |
Bibliographie: | Includes bibliographical references. |
ISBN: | 0833059602 9780833059604 9780833059581 0833059580 1280126949 9781280126949 9786613530806 6613530808 |
Internformat
MARC
LEADER | 00000cam a2200000Ma 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn769190544 | ||
003 | OCoLC | ||
005 | 20250103110447.0 | ||
006 | m o d | ||
007 | cr cn||||||||| | ||
008 | 111211s2011 cau ob 000 0 eng d | ||
040 | |a E7B |b eng |e pn |c E7B |d OCLCO |d DEBSZ |d OCLCQ |d OCLCA |d YDXCP |d EBLCP |d EDX |d JSTOR |d TEFOD |d N$T |d AU@ |d OCLCA |d TEFOD |d OCLCQ |d AZK |d LOA |d AGLDB |d CNNOR |d MOR |d Z5A |d PIFAG |d ZCU |d MERUC |d OCLCQ |d JBG |d OCLCQ |d LND |d VFL |d U3W |d OCLCA |d ICG |d OCLCF |d STF |d WRM |d VTS |d ICN |d NRAMU |d INT |d VT2 |d EZ9 |d ERL |d OCLCQ |d G3B |d TKN |d OCLCQ |d DKC |d CNTRU |d OCLCQ |d NJT |d OCLCQ |d OCL |d VLY |d AJS |d OCLCO |d OCLCQ |d OCLCO |d FUT |d OCLCL |d OCLCO |d OCLCL |d OCLCO | ||
019 | |a 780425716 |a 842279178 |a 880747024 |a 961512493 |a 962669339 |a 1162390545 | ||
020 | |a 0833059602 | ||
020 | |a 9780833059604 | ||
020 | |a 9780833059581 |q (electronic bk.) | ||
020 | |a 0833059580 |q (electronic bk.) | ||
020 | |z 9780833059604 | ||
020 | |a 1280126949 | ||
020 | |a 9781280126949 | ||
020 | |a 9786613530806 | ||
020 | |a 6613530808 | ||
035 | |a (OCoLC)769190544 |z (OCoLC)780425716 |z (OCoLC)842279178 |z (OCoLC)880747024 |z (OCoLC)961512493 |z (OCoLC)962669339 |z (OCoLC)1162390545 | ||
037 | |a 22573/ctt3n24s |b JSTOR | ||
037 | |a 25A4ADF2-3B12-43FC-A159-1568B3C850A6 |b OverDrive, Inc. |n http://www.overdrive.com | ||
043 | |a e------ | ||
050 | 4 | |a QA76.585 |b .R635 2011eb | |
072 | 7 | |a COM060040 |2 bisacsh | |
072 | 7 | |a LAW105000 |2 bisacsh | |
072 | 7 | |a LAW |x 018000 |2 bisacsh | |
072 | 7 | |a LAW |x 075000 |2 bisacsh | |
082 | 7 | |a 342.40858 | |
049 | |a MAIN | ||
100 | 1 | |a Robinson, Neil, |d 1964- |1 https://id.oclc.org/worldcat/entity/E39PCjrVy38GJ3fvD9Y78gTMpq |0 http://id.loc.gov/authorities/names/n94121654 | |
245 | 1 | 4 | |a The cloud : |b understanding the security, privacy and trust challenges / |c Neil Robinson [and others]. |
260 | |a Santa Monica : |b Rand, |c 2011. | ||
300 | |a 1 online resource (xii, 122 pages) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a data file |2 rda | ||
490 | 1 | |a Technical report ; |v [TR-933-EC] | |
500 | |a "Sponsored by the European Commission Directorate General Information Society and Media." | ||
504 | |a Includes bibliographical references. | ||
505 | 0 | |a Executive summary -- Synthesis -- ch. 1: Introduction -- ch. 2: Definitions and drivers -- ch. 3: Understanding the implications for security, privacy and trust --ch. 4: Security, privacy and trust challenges stemming from thetechnological underpinnings of cloud computing -- ch. 5: Security, privacy and trust challenges inherent to the legal and regulatory aspects of cloud computing -- ch. 6: Putting it all together: key risks and operational challenges -- ch. 7: Case studies -- ch. 8: Gap analysis -- ch. 9: Solving the challenges: recommendations and actions -- ch. 10: Conclusions -- References -- Appendices. | |
505 | 0 | |a Cover; Title Page; Copyright; Preface; Acknowledgements; Contents; Glossary; Executive Summary; Synthesis; Defining cloud computing; Defining security, privacy and trust; Issues arising from the reviewed literature; Risk control frameworks; Operational challenges; Implications from case studies; Gap analysis; Solving the challenges: observations and recommendations; Conclusions; Methodology; Structure of the report; Chapter 1: Introduction; Chapter 2: Definitions and drivers; 2.1 Definitions of cloud computing; 2.2 What's pushing cloud take-up? | |
505 | 8 | |a 2.3 The economics of cloud computing: implications for security 2.4 Concluding remarks; Chapter 3: Understanding the implications for security, privacy and trust; 3.1 Defining security, privacy and trust; 3.2 Growing focus on security, privacy and trust concerns; 3.3 Identifying key issues and possible enablers for security, trust and privacy in the cloud; Chapter 4: Security, privacy and trust challenges stemming from thetechnological underpinnings of cloud computing; 4.1 The linchpin of trust: the hypervisor. | |
505 | 8 | |a 4.2 Can the distributed models of computation characteristic of grid technology adequately serve the availability and interoperability needs ofcloud computing?; 4.3 Current state-of-the-art web services may not be sufficient to establishinteroperability for identity management in the cloud; 4.4 Trustworthiness in service-orientated architectures (SOAs); 4.5 Will web application frameworks (APIs and SDKs) be credible inproviding trust across distributed environments?; 4.6 The fragility of current encryption approaches in the cloud context; 4.7 Concluding remarks. | |
505 | 8 | |a Chapter 5: Security, privacy and trust challenges inherent to the legaland regulatory aspects of cloud computing; 5.1 Horizontal perspective: applicable law and jurisdiction; 5.2 Vertical issues: main applicable laws; 5.3 The will of the parties: contractual provisions; 5.4 Overcoming legal barriers: key tools; 5.5 Concluding remarks; Chapter 6: Putting it all together: key risks and operational challenges; 6.1 Summary of legal and technical issues; 6.2 Migrating to the cloud: the operational challenges; Chapter 7: Case studies; 7.1 Introduction; 7.2 Initial classification of case studies. | |
505 | 8 | |a 7.3 Observations on case studies in practice; 7.4 Matrix of case study typology; 7.5 Case Study 1: the Danish National IT and Telecom Agency; 7.6 Case study 2: the City of Los Angeles; 7.7 Case study 3: EU eHealth provider; 7.8 Implications; Chapter8: Gap analysis; Chapter 9: Solving the challenges: recommendations and actions; 9.1 Introduction; 9.2 Recommendations; 9.3 Specific actions; Chapter 10: Conclusions; References; Appendices. | |
520 | |a This report discusses how policy-makers might address the challenges and risks in respect of the security, privacy and trust aspects of cloud computing that could undermine the attainment of broader economic and societal objectives across Europe. | ||
546 | |a English. | ||
650 | 0 | |a Cloud computing |x Security measures. | |
650 | 0 | |a Computer security. | |
650 | 0 | |a Privacy, Right of. |0 http://id.loc.gov/authorities/subjects/sh85107029 | |
650 | 0 | |a Information policy |z European Union countries. | |
650 | 6 | |a Infonuagique |x Sécurité |x Mesures. | |
650 | 6 | |a Sécurité informatique. | |
650 | 6 | |a Information |x Politique gouvernementale |z Pays de l'Union européenne. | |
650 | 7 | |a COMPUTERS |x Internet |x Security. |2 bisacsh | |
650 | 7 | |a LAW |x Constitutional. |2 bisacsh | |
650 | 7 | |a LAW |x Public. |2 bisacsh | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Information policy |2 fast | |
650 | 7 | |a Privacy, Right of |2 fast | |
651 | 7 | |a European Union countries |2 fast | |
710 | 2 | |a Rand Corporation. |1 https://id.oclc.org/worldcat/entity/E39QH7Jmqgr6rtXkJPthpf44Fg |0 http://id.loc.gov/authorities/names/n78083407 | |
710 | 2 | |a European Commission. |b Information Society DG. |1 https://id.oclc.org/worldcat/entity/E39QQPVp83gkGFgyCGP4PdkVdF |0 http://id.loc.gov/authorities/names/no00071082 | |
758 | |i has work: |a The Cloud (Text) |1 https://id.oclc.org/worldcat/entity/E39PCGRxYkx3pPRF3W6RrrwqDC |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Robinson, Neil. |t Cloud : Understanding the Security, Privacy and Trust Challenges. |d Santa Monica : RAND Corporation, ©2011 |
830 | 0 | |a Technical report (Rand Corporation) ; |v TR-933-EC. |0 http://id.loc.gov/authorities/names/n2005069635 | |
966 | 4 | 0 | |l DE-862 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=408758 |3 Volltext |
966 | 4 | 0 | |l DE-863 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=408758 |3 Volltext |
938 | |a EBL - Ebook Library |b EBLB |n EBL825129 | ||
938 | |a ebrary |b EBRY |n ebr10516122 | ||
938 | |a EBSCOhost |b EBSC |n 408758 | ||
938 | |a YBP Library Services |b YANK |n 7273051 | ||
938 | |a YBP Library Services |b YANK |n 10861989 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-862 | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn769190544 |
---|---|
_version_ | 1829094713988218880 |
adam_text | |
any_adam_object | |
author | Robinson, Neil, 1964- |
author_GND | http://id.loc.gov/authorities/names/n94121654 |
author_corporate | Rand Corporation European Commission. Information Society DG |
author_corporate_role | |
author_facet | Robinson, Neil, 1964- Rand Corporation European Commission. Information Society DG |
author_role | |
author_sort | Robinson, Neil, 1964- |
author_variant | n r nr |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.585 .R635 2011eb |
callnumber-search | QA76.585 .R635 2011eb |
callnumber-sort | QA 276.585 R635 42011EB |
callnumber-subject | QA - Mathematics |
collection | ZDB-4-EBA |
contents | Executive summary -- Synthesis -- ch. 1: Introduction -- ch. 2: Definitions and drivers -- ch. 3: Understanding the implications for security, privacy and trust --ch. 4: Security, privacy and trust challenges stemming from thetechnological underpinnings of cloud computing -- ch. 5: Security, privacy and trust challenges inherent to the legal and regulatory aspects of cloud computing -- ch. 6: Putting it all together: key risks and operational challenges -- ch. 7: Case studies -- ch. 8: Gap analysis -- ch. 9: Solving the challenges: recommendations and actions -- ch. 10: Conclusions -- References -- Appendices. Cover; Title Page; Copyright; Preface; Acknowledgements; Contents; Glossary; Executive Summary; Synthesis; Defining cloud computing; Defining security, privacy and trust; Issues arising from the reviewed literature; Risk control frameworks; Operational challenges; Implications from case studies; Gap analysis; Solving the challenges: observations and recommendations; Conclusions; Methodology; Structure of the report; Chapter 1: Introduction; Chapter 2: Definitions and drivers; 2.1 Definitions of cloud computing; 2.2 What's pushing cloud take-up? 2.3 The economics of cloud computing: implications for security 2.4 Concluding remarks; Chapter 3: Understanding the implications for security, privacy and trust; 3.1 Defining security, privacy and trust; 3.2 Growing focus on security, privacy and trust concerns; 3.3 Identifying key issues and possible enablers for security, trust and privacy in the cloud; Chapter 4: Security, privacy and trust challenges stemming from thetechnological underpinnings of cloud computing; 4.1 The linchpin of trust: the hypervisor. 4.2 Can the distributed models of computation characteristic of grid technology adequately serve the availability and interoperability needs ofcloud computing?; 4.3 Current state-of-the-art web services may not be sufficient to establishinteroperability for identity management in the cloud; 4.4 Trustworthiness in service-orientated architectures (SOAs); 4.5 Will web application frameworks (APIs and SDKs) be credible inproviding trust across distributed environments?; 4.6 The fragility of current encryption approaches in the cloud context; 4.7 Concluding remarks. Chapter 5: Security, privacy and trust challenges inherent to the legaland regulatory aspects of cloud computing; 5.1 Horizontal perspective: applicable law and jurisdiction; 5.2 Vertical issues: main applicable laws; 5.3 The will of the parties: contractual provisions; 5.4 Overcoming legal barriers: key tools; 5.5 Concluding remarks; Chapter 6: Putting it all together: key risks and operational challenges; 6.1 Summary of legal and technical issues; 6.2 Migrating to the cloud: the operational challenges; Chapter 7: Case studies; 7.1 Introduction; 7.2 Initial classification of case studies. 7.3 Observations on case studies in practice; 7.4 Matrix of case study typology; 7.5 Case Study 1: the Danish National IT and Telecom Agency; 7.6 Case study 2: the City of Los Angeles; 7.7 Case study 3: EU eHealth provider; 7.8 Implications; Chapter8: Gap analysis; Chapter 9: Solving the challenges: recommendations and actions; 9.1 Introduction; 9.2 Recommendations; 9.3 Specific actions; Chapter 10: Conclusions; References; Appendices. |
ctrlnum | (OCoLC)769190544 |
dewey-full | 342.40858 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 342 - Constitutional and administrative law |
dewey-raw | 342.40858 |
dewey-search | 342.40858 |
dewey-sort | 3342.40858 |
dewey-tens | 340 - Law |
discipline | Rechtswissenschaft |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>07753cam a2200901Ma 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn769190544</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20250103110447.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cn|||||||||</controlfield><controlfield tag="008">111211s2011 cau ob 000 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">E7B</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">E7B</subfield><subfield code="d">OCLCO</subfield><subfield code="d">DEBSZ</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCA</subfield><subfield code="d">YDXCP</subfield><subfield code="d">EBLCP</subfield><subfield code="d">EDX</subfield><subfield code="d">JSTOR</subfield><subfield code="d">TEFOD</subfield><subfield code="d">N$T</subfield><subfield code="d">AU@</subfield><subfield code="d">OCLCA</subfield><subfield code="d">TEFOD</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">AZK</subfield><subfield code="d">LOA</subfield><subfield code="d">AGLDB</subfield><subfield code="d">CNNOR</subfield><subfield code="d">MOR</subfield><subfield code="d">Z5A</subfield><subfield code="d">PIFAG</subfield><subfield code="d">ZCU</subfield><subfield code="d">MERUC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">JBG</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">LND</subfield><subfield code="d">VFL</subfield><subfield code="d">U3W</subfield><subfield code="d">OCLCA</subfield><subfield code="d">ICG</subfield><subfield code="d">OCLCF</subfield><subfield code="d">STF</subfield><subfield code="d">WRM</subfield><subfield code="d">VTS</subfield><subfield code="d">ICN</subfield><subfield code="d">NRAMU</subfield><subfield code="d">INT</subfield><subfield code="d">VT2</subfield><subfield code="d">EZ9</subfield><subfield code="d">ERL</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">G3B</subfield><subfield code="d">TKN</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">DKC</subfield><subfield code="d">CNTRU</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">NJT</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCL</subfield><subfield code="d">VLY</subfield><subfield code="d">AJS</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">FUT</subfield><subfield code="d">OCLCL</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield><subfield code="d">OCLCO</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">780425716</subfield><subfield code="a">842279178</subfield><subfield code="a">880747024</subfield><subfield code="a">961512493</subfield><subfield code="a">962669339</subfield><subfield code="a">1162390545</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0833059602</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780833059604</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780833059581</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0833059580</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9780833059604</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1280126949</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781280126949</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9786613530806</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">6613530808</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)769190544</subfield><subfield code="z">(OCoLC)780425716</subfield><subfield code="z">(OCoLC)842279178</subfield><subfield code="z">(OCoLC)880747024</subfield><subfield code="z">(OCoLC)961512493</subfield><subfield code="z">(OCoLC)962669339</subfield><subfield code="z">(OCoLC)1162390545</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">22573/ctt3n24s</subfield><subfield code="b">JSTOR</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">25A4ADF2-3B12-43FC-A159-1568B3C850A6</subfield><subfield code="b">OverDrive, Inc.</subfield><subfield code="n">http://www.overdrive.com</subfield></datafield><datafield tag="043" ind1=" " ind2=" "><subfield code="a">e------</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.585</subfield><subfield code="b">.R635 2011eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM060040</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">LAW105000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">LAW</subfield><subfield code="x">018000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">LAW</subfield><subfield code="x">075000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">342.40858</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Robinson, Neil,</subfield><subfield code="d">1964-</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCjrVy38GJ3fvD9Y78gTMpq</subfield><subfield code="0">http://id.loc.gov/authorities/names/n94121654</subfield></datafield><datafield tag="245" ind1="1" ind2="4"><subfield code="a">The cloud :</subfield><subfield code="b">understanding the security, privacy and trust challenges /</subfield><subfield code="c">Neil Robinson [and others].</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Santa Monica :</subfield><subfield code="b">Rand,</subfield><subfield code="c">2011.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xii, 122 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">data file</subfield><subfield code="2">rda</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Technical report ;</subfield><subfield code="v">[TR-933-EC]</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"Sponsored by the European Commission Directorate General Information Society and Media."</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Executive summary -- Synthesis -- ch. 1: Introduction -- ch. 2: Definitions and drivers -- ch. 3: Understanding the implications for security, privacy and trust --ch. 4: Security, privacy and trust challenges stemming from thetechnological underpinnings of cloud computing -- ch. 5: Security, privacy and trust challenges inherent to the legal and regulatory aspects of cloud computing -- ch. 6: Putting it all together: key risks and operational challenges -- ch. 7: Case studies -- ch. 8: Gap analysis -- ch. 9: Solving the challenges: recommendations and actions -- ch. 10: Conclusions -- References -- Appendices.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Cover; Title Page; Copyright; Preface; Acknowledgements; Contents; Glossary; Executive Summary; Synthesis; Defining cloud computing; Defining security, privacy and trust; Issues arising from the reviewed literature; Risk control frameworks; Operational challenges; Implications from case studies; Gap analysis; Solving the challenges: observations and recommendations; Conclusions; Methodology; Structure of the report; Chapter 1: Introduction; Chapter 2: Definitions and drivers; 2.1 Definitions of cloud computing; 2.2 What's pushing cloud take-up?</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">2.3 The economics of cloud computing: implications for security 2.4 Concluding remarks; Chapter 3: Understanding the implications for security, privacy and trust; 3.1 Defining security, privacy and trust; 3.2 Growing focus on security, privacy and trust concerns; 3.3 Identifying key issues and possible enablers for security, trust and privacy in the cloud; Chapter 4: Security, privacy and trust challenges stemming from thetechnological underpinnings of cloud computing; 4.1 The linchpin of trust: the hypervisor.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">4.2 Can the distributed models of computation characteristic of grid technology adequately serve the availability and interoperability needs ofcloud computing?; 4.3 Current state-of-the-art web services may not be sufficient to establishinteroperability for identity management in the cloud; 4.4 Trustworthiness in service-orientated architectures (SOAs); 4.5 Will web application frameworks (APIs and SDKs) be credible inproviding trust across distributed environments?; 4.6 The fragility of current encryption approaches in the cloud context; 4.7 Concluding remarks.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Chapter 5: Security, privacy and trust challenges inherent to the legaland regulatory aspects of cloud computing; 5.1 Horizontal perspective: applicable law and jurisdiction; 5.2 Vertical issues: main applicable laws; 5.3 The will of the parties: contractual provisions; 5.4 Overcoming legal barriers: key tools; 5.5 Concluding remarks; Chapter 6: Putting it all together: key risks and operational challenges; 6.1 Summary of legal and technical issues; 6.2 Migrating to the cloud: the operational challenges; Chapter 7: Case studies; 7.1 Introduction; 7.2 Initial classification of case studies.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">7.3 Observations on case studies in practice; 7.4 Matrix of case study typology; 7.5 Case Study 1: the Danish National IT and Telecom Agency; 7.6 Case study 2: the City of Los Angeles; 7.7 Case study 3: EU eHealth provider; 7.8 Implications; Chapter8: Gap analysis; Chapter 9: Solving the challenges: recommendations and actions; 9.1 Introduction; 9.2 Recommendations; 9.3 Specific actions; Chapter 10: Conclusions; References; Appendices.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This report discusses how policy-makers might address the challenges and risks in respect of the security, privacy and trust aspects of cloud computing that could undermine the attainment of broader economic and societal objectives across Europe.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cloud computing</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Privacy, Right of.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh85107029</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Information policy</subfield><subfield code="z">European Union countries.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Infonuagique</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Sécurité informatique.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Information</subfield><subfield code="x">Politique gouvernementale</subfield><subfield code="z">Pays de l'Union européenne.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Internet</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">LAW</subfield><subfield code="x">Constitutional.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">LAW</subfield><subfield code="x">Public.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Information policy</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Privacy, Right of</subfield><subfield code="2">fast</subfield></datafield><datafield tag="651" ind1=" " ind2="7"><subfield code="a">European Union countries</subfield><subfield code="2">fast</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">Rand Corporation.</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39QH7Jmqgr6rtXkJPthpf44Fg</subfield><subfield code="0">http://id.loc.gov/authorities/names/n78083407</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">European Commission.</subfield><subfield code="b">Information Society DG.</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39QQPVp83gkGFgyCGP4PdkVdF</subfield><subfield code="0">http://id.loc.gov/authorities/names/no00071082</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">The Cloud (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCGRxYkx3pPRF3W6RrrwqDC</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Robinson, Neil.</subfield><subfield code="t">Cloud : Understanding the Security, Privacy and Trust Challenges.</subfield><subfield code="d">Santa Monica : RAND Corporation, ©2011</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Technical report (Rand Corporation) ;</subfield><subfield code="v">TR-933-EC.</subfield><subfield code="0">http://id.loc.gov/authorities/names/n2005069635</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-862</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=408758</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-863</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=408758</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBL - Ebook Library</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL825129</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ebrary</subfield><subfield code="b">EBRY</subfield><subfield code="n">ebr10516122</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">408758</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">7273051</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">10861989</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-862</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
geographic | European Union countries fast |
geographic_facet | European Union countries |
id | ZDB-4-EBA-ocn769190544 |
illustrated | Not Illustrated |
indexdate | 2025-04-11T08:37:30Z |
institution | BVB |
institution_GND | http://id.loc.gov/authorities/names/n78083407 http://id.loc.gov/authorities/names/no00071082 |
isbn | 0833059602 9780833059604 9780833059581 0833059580 1280126949 9781280126949 9786613530806 6613530808 |
language | English |
oclc_num | 769190544 |
open_access_boolean | |
owner | MAIN DE-862 DE-BY-FWS DE-863 DE-BY-FWS |
owner_facet | MAIN DE-862 DE-BY-FWS DE-863 DE-BY-FWS |
physical | 1 online resource (xii, 122 pages) |
psigel | ZDB-4-EBA FWS_PDA_EBA ZDB-4-EBA |
publishDate | 2011 |
publishDateSearch | 2011 |
publishDateSort | 2011 |
publisher | Rand, |
record_format | marc |
series | Technical report (Rand Corporation) ; |
series2 | Technical report ; |
spelling | Robinson, Neil, 1964- https://id.oclc.org/worldcat/entity/E39PCjrVy38GJ3fvD9Y78gTMpq http://id.loc.gov/authorities/names/n94121654 The cloud : understanding the security, privacy and trust challenges / Neil Robinson [and others]. Santa Monica : Rand, 2011. 1 online resource (xii, 122 pages) text txt rdacontent computer c rdamedia online resource cr rdacarrier data file rda Technical report ; [TR-933-EC] "Sponsored by the European Commission Directorate General Information Society and Media." Includes bibliographical references. Executive summary -- Synthesis -- ch. 1: Introduction -- ch. 2: Definitions and drivers -- ch. 3: Understanding the implications for security, privacy and trust --ch. 4: Security, privacy and trust challenges stemming from thetechnological underpinnings of cloud computing -- ch. 5: Security, privacy and trust challenges inherent to the legal and regulatory aspects of cloud computing -- ch. 6: Putting it all together: key risks and operational challenges -- ch. 7: Case studies -- ch. 8: Gap analysis -- ch. 9: Solving the challenges: recommendations and actions -- ch. 10: Conclusions -- References -- Appendices. Cover; Title Page; Copyright; Preface; Acknowledgements; Contents; Glossary; Executive Summary; Synthesis; Defining cloud computing; Defining security, privacy and trust; Issues arising from the reviewed literature; Risk control frameworks; Operational challenges; Implications from case studies; Gap analysis; Solving the challenges: observations and recommendations; Conclusions; Methodology; Structure of the report; Chapter 1: Introduction; Chapter 2: Definitions and drivers; 2.1 Definitions of cloud computing; 2.2 What's pushing cloud take-up? 2.3 The economics of cloud computing: implications for security 2.4 Concluding remarks; Chapter 3: Understanding the implications for security, privacy and trust; 3.1 Defining security, privacy and trust; 3.2 Growing focus on security, privacy and trust concerns; 3.3 Identifying key issues and possible enablers for security, trust and privacy in the cloud; Chapter 4: Security, privacy and trust challenges stemming from thetechnological underpinnings of cloud computing; 4.1 The linchpin of trust: the hypervisor. 4.2 Can the distributed models of computation characteristic of grid technology adequately serve the availability and interoperability needs ofcloud computing?; 4.3 Current state-of-the-art web services may not be sufficient to establishinteroperability for identity management in the cloud; 4.4 Trustworthiness in service-orientated architectures (SOAs); 4.5 Will web application frameworks (APIs and SDKs) be credible inproviding trust across distributed environments?; 4.6 The fragility of current encryption approaches in the cloud context; 4.7 Concluding remarks. Chapter 5: Security, privacy and trust challenges inherent to the legaland regulatory aspects of cloud computing; 5.1 Horizontal perspective: applicable law and jurisdiction; 5.2 Vertical issues: main applicable laws; 5.3 The will of the parties: contractual provisions; 5.4 Overcoming legal barriers: key tools; 5.5 Concluding remarks; Chapter 6: Putting it all together: key risks and operational challenges; 6.1 Summary of legal and technical issues; 6.2 Migrating to the cloud: the operational challenges; Chapter 7: Case studies; 7.1 Introduction; 7.2 Initial classification of case studies. 7.3 Observations on case studies in practice; 7.4 Matrix of case study typology; 7.5 Case Study 1: the Danish National IT and Telecom Agency; 7.6 Case study 2: the City of Los Angeles; 7.7 Case study 3: EU eHealth provider; 7.8 Implications; Chapter8: Gap analysis; Chapter 9: Solving the challenges: recommendations and actions; 9.1 Introduction; 9.2 Recommendations; 9.3 Specific actions; Chapter 10: Conclusions; References; Appendices. This report discusses how policy-makers might address the challenges and risks in respect of the security, privacy and trust aspects of cloud computing that could undermine the attainment of broader economic and societal objectives across Europe. English. Cloud computing Security measures. Computer security. Privacy, Right of. http://id.loc.gov/authorities/subjects/sh85107029 Information policy European Union countries. Infonuagique Sécurité Mesures. Sécurité informatique. Information Politique gouvernementale Pays de l'Union européenne. COMPUTERS Internet Security. bisacsh LAW Constitutional. bisacsh LAW Public. bisacsh Computer security fast Information policy fast Privacy, Right of fast European Union countries fast Rand Corporation. https://id.oclc.org/worldcat/entity/E39QH7Jmqgr6rtXkJPthpf44Fg http://id.loc.gov/authorities/names/n78083407 European Commission. Information Society DG. https://id.oclc.org/worldcat/entity/E39QQPVp83gkGFgyCGP4PdkVdF http://id.loc.gov/authorities/names/no00071082 has work: The Cloud (Text) https://id.oclc.org/worldcat/entity/E39PCGRxYkx3pPRF3W6RrrwqDC https://id.oclc.org/worldcat/ontology/hasWork Print version: Robinson, Neil. Cloud : Understanding the Security, Privacy and Trust Challenges. Santa Monica : RAND Corporation, ©2011 Technical report (Rand Corporation) ; TR-933-EC. http://id.loc.gov/authorities/names/n2005069635 |
spellingShingle | Robinson, Neil, 1964- The cloud : understanding the security, privacy and trust challenges / Technical report (Rand Corporation) ; Executive summary -- Synthesis -- ch. 1: Introduction -- ch. 2: Definitions and drivers -- ch. 3: Understanding the implications for security, privacy and trust --ch. 4: Security, privacy and trust challenges stemming from thetechnological underpinnings of cloud computing -- ch. 5: Security, privacy and trust challenges inherent to the legal and regulatory aspects of cloud computing -- ch. 6: Putting it all together: key risks and operational challenges -- ch. 7: Case studies -- ch. 8: Gap analysis -- ch. 9: Solving the challenges: recommendations and actions -- ch. 10: Conclusions -- References -- Appendices. Cover; Title Page; Copyright; Preface; Acknowledgements; Contents; Glossary; Executive Summary; Synthesis; Defining cloud computing; Defining security, privacy and trust; Issues arising from the reviewed literature; Risk control frameworks; Operational challenges; Implications from case studies; Gap analysis; Solving the challenges: observations and recommendations; Conclusions; Methodology; Structure of the report; Chapter 1: Introduction; Chapter 2: Definitions and drivers; 2.1 Definitions of cloud computing; 2.2 What's pushing cloud take-up? 2.3 The economics of cloud computing: implications for security 2.4 Concluding remarks; Chapter 3: Understanding the implications for security, privacy and trust; 3.1 Defining security, privacy and trust; 3.2 Growing focus on security, privacy and trust concerns; 3.3 Identifying key issues and possible enablers for security, trust and privacy in the cloud; Chapter 4: Security, privacy and trust challenges stemming from thetechnological underpinnings of cloud computing; 4.1 The linchpin of trust: the hypervisor. 4.2 Can the distributed models of computation characteristic of grid technology adequately serve the availability and interoperability needs ofcloud computing?; 4.3 Current state-of-the-art web services may not be sufficient to establishinteroperability for identity management in the cloud; 4.4 Trustworthiness in service-orientated architectures (SOAs); 4.5 Will web application frameworks (APIs and SDKs) be credible inproviding trust across distributed environments?; 4.6 The fragility of current encryption approaches in the cloud context; 4.7 Concluding remarks. Chapter 5: Security, privacy and trust challenges inherent to the legaland regulatory aspects of cloud computing; 5.1 Horizontal perspective: applicable law and jurisdiction; 5.2 Vertical issues: main applicable laws; 5.3 The will of the parties: contractual provisions; 5.4 Overcoming legal barriers: key tools; 5.5 Concluding remarks; Chapter 6: Putting it all together: key risks and operational challenges; 6.1 Summary of legal and technical issues; 6.2 Migrating to the cloud: the operational challenges; Chapter 7: Case studies; 7.1 Introduction; 7.2 Initial classification of case studies. 7.3 Observations on case studies in practice; 7.4 Matrix of case study typology; 7.5 Case Study 1: the Danish National IT and Telecom Agency; 7.6 Case study 2: the City of Los Angeles; 7.7 Case study 3: EU eHealth provider; 7.8 Implications; Chapter8: Gap analysis; Chapter 9: Solving the challenges: recommendations and actions; 9.1 Introduction; 9.2 Recommendations; 9.3 Specific actions; Chapter 10: Conclusions; References; Appendices. Cloud computing Security measures. Computer security. Privacy, Right of. http://id.loc.gov/authorities/subjects/sh85107029 Information policy European Union countries. Infonuagique Sécurité Mesures. Sécurité informatique. Information Politique gouvernementale Pays de l'Union européenne. COMPUTERS Internet Security. bisacsh LAW Constitutional. bisacsh LAW Public. bisacsh Computer security fast Information policy fast Privacy, Right of fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh85107029 |
title | The cloud : understanding the security, privacy and trust challenges / |
title_auth | The cloud : understanding the security, privacy and trust challenges / |
title_exact_search | The cloud : understanding the security, privacy and trust challenges / |
title_full | The cloud : understanding the security, privacy and trust challenges / Neil Robinson [and others]. |
title_fullStr | The cloud : understanding the security, privacy and trust challenges / Neil Robinson [and others]. |
title_full_unstemmed | The cloud : understanding the security, privacy and trust challenges / Neil Robinson [and others]. |
title_short | The cloud : |
title_sort | cloud understanding the security privacy and trust challenges |
title_sub | understanding the security, privacy and trust challenges / |
topic | Cloud computing Security measures. Computer security. Privacy, Right of. http://id.loc.gov/authorities/subjects/sh85107029 Information policy European Union countries. Infonuagique Sécurité Mesures. Sécurité informatique. Information Politique gouvernementale Pays de l'Union européenne. COMPUTERS Internet Security. bisacsh LAW Constitutional. bisacsh LAW Public. bisacsh Computer security fast Information policy fast Privacy, Right of fast |
topic_facet | Cloud computing Security measures. Computer security. Privacy, Right of. Information policy European Union countries. Infonuagique Sécurité Mesures. Sécurité informatique. Information Politique gouvernementale Pays de l'Union européenne. COMPUTERS Internet Security. LAW Constitutional. LAW Public. Computer security Information policy Privacy, Right of European Union countries |
work_keys_str_mv | AT robinsonneil thecloudunderstandingthesecurityprivacyandtrustchallenges AT randcorporation thecloudunderstandingthesecurityprivacyandtrustchallenges AT europeancommissioninformationsocietydg thecloudunderstandingthesecurityprivacyandtrustchallenges AT robinsonneil cloudunderstandingthesecurityprivacyandtrustchallenges AT randcorporation cloudunderstandingthesecurityprivacyandtrustchallenges AT europeancommissioninformationsocietydg cloudunderstandingthesecurityprivacyandtrustchallenges |