Skip to main content

Home/ Cloud Computing/ Group items tagged jericho

Rss Feed Group items tagged

Rich Hintz

cloud_cube_model_v1.0.pdf (application/pdf Object) - 0 views

  •  
    aim of this paper is to: - point out that not everything is best implemented in clouds; it may be best to operate some business functions using a traditional non-cloud approach - explain the different cloud formations that the Jericho Forum has identified - describe key characteristics, benefits and risks of each cloud formation - provide a framework for exploring in more detail the nature of different cloud formations and the issues that need answering to make them safe and secure places to work in
Kelly Hair

Cloud security: Feds on cusp of change -- Federal Computer Week - 0 views

  • Virtualization has been setting the stage for many of these issues for years, he said, but “what cloud computing is forcing us to look at is the survivability of systems…and protecting the data,” Hoff said. “While I hear the perimeter is going away [as a security approach], I disagree; it’s multiplying and the diameter is contracting,” Hoff said. “You’re going to outsource responsibility, but not accountability. So we need open standards and better visibility.”
  •  
    Interesting view on depermeterisation. Hoff's view is that the protected assets are in smaller clumps and still have a perimeter.
1 - 2 of 2
Showing 20 items per page