applications to the cloud, and how trusted clouds, that have their integrity rooted in hardware, can address these challenges.
This book provides: Use cases and solution reference architectures to enable infrastructure integrity and the creation of trusted pools leveraging Intel Trusted Execution Technology (TXT); Trusted geo-location management in the cloud, enabling workload and data location compliance and boundary control usages in the cloud; OpenStack-based reference architecture of tenant-controlled virtual machine and workload protection in the cloud; A reference design to enable secure hybrid clouds for a cloud bursting use case, providing infrastructure visibility and control to organizations.
Table of contents
- Cloud Computing Basics
- The Trusted Cloud: Addressing Security and Compliance
- Platform Boot Integrity: Foundation for Trusted Compute Pools
- Attestation: Proving Trustability
- Boundary Control in the Cloud: Geo-Tagging and Asset Tagging
- Network Security in the Cloud
- Identity Management and Control for Clouds
- Trusted Virtual Machines: Ensuring the Integrity of Virtual Machines in the Cloud
- A Reference Design for Secure Cloud Bursting
Pages : | 240 |
Size : | 8.6 MB |
Downloads: | 100 |
Created: | 2022-02-01 |
License: | CC BY-NC-ND |
Author(s): | by Raghu Yeluri, Enrique Castro-Leon |
Warning: Trying to access array offset on false in /home/tutovnfz/public_html/amp/article-amp.php on line 263
Others related eBooks about Building the Infrastructure for Cloud Security
Download free Network Security Tutorial in PDF for beginners (Network Security Fundamentals, Why We Need Security, Definitions and Concepts).
Web application security may seem like a complex, daunting task. This book is a quick guide to understanding how to make your website secure. It surveys the best steps for establishing a regular program to quickly find vulnerabilities in your site with a web application scanner.
This is a series of lessons that's basic about the networking concepts, networking tools, security and countermeasures.
This PDF tutorial will examine various denial of service attacks and network defense measures taken against them.
For cloud users and providers alike, security is an everyday concern, yet there are very f..., download free Cloud Security tutorial in PDF (244 pages) created by Raghuram Yeluri .