applications to the cloud, and how trusted clouds, that have their integrity rooted in hardware, can address these challenges.
This book provides: Use cases and solution reference architectures to enable infrastructure integrity and the creation of trusted pools leveraging Intel Trusted Execution Technology (TXT); Trusted geo-location management in the cloud, enabling workload and data location compliance and boundary control usages in the cloud; OpenStack-based reference architecture of tenant-controlled virtual machine and workload protection in the cloud; A reference design to enable secure hybrid clouds for a cloud bursting use case, providing infrastructure visibility and control to organizations.
Table of contents
- Cloud Computing Basics
- The Trusted Cloud: Addressing Security and Compliance
- Platform Boot Integrity: Foundation for Trusted Compute Pools
- Attestation: Proving Trustability
- Boundary Control in the Cloud: Geo-Tagging and Asset Tagging
- Network Security in the Cloud
- Identity Management and Control for Clouds
- Trusted Virtual Machines: Ensuring the Integrity of Virtual Machines in the Cloud
- A Reference Design for Secure Cloud Bursting
Pages : | 240 |
Size : | 8.6 MB |
Downloads: | 113 |
Created: | 2022-02-01 |
License: | CC BY-NC-ND |
Author(s): | by Raghu Yeluri, Enrique Castro-Leon |
Warning: Trying to access array offset on false in /home/tutovnfz/public_html/amp/article-amp.php on line 263
Others related eBooks about Building the Infrastructure for Cloud Security
Over 75% of network attacks are targeted at the web application layer. This book provides explicit hacks, tutorials, penetration tests, and step-by-step demonstrations for security professionals and Web application developers to defend their most vulnerable applications.
For cloud users and providers alike, security is an everyday concern, yet there are very f..., download free Cloud Security tutorial in PDF (244 pages) created by Raghuram Yeluri .
Platform Embedded Security Technology Revealed is an in-depth introduction to Intel's plat..., download free Security Technology tutorial in PDF (272 pages) created by Xiaoyu Ruan .
This definitive text/reference on computer network and information security presents a com..., download free Network Security tutorial in PDF (572 pages) created by Joseph Migga Kizza .
Download free course Guide to Computer Network Security, pdf file on 572 pages by Joseph Migga Kizza.