TITLE

Spotting Cloud Formations

AUTHOR(S)
Adams, John
PUB. DATE
August 2010
SOURCE
Bank Technology News;Aug2010, Vol. 23 Issue 8, p25
SOURCE TYPE
Trade Publication
DOC. TYPE
Interview
ABSTRACT
An interview with a group of technology analysts and financial professionals is presented. They discuss the safe use of cloud computing for the future adoption as it depends on bank's confidence in systems and data security as well as the user authentication. They elaborate the literal limitations of cloud computing and how one could get the providers attention in a multi-tenant environment.
ACCESSION #
53576597

 

Related Articles

  • A Comprehensive Approach to Ensure Secure Data Communication in Cloud Environment.  // International Journal of Computer Applications;Dec2010, Vol. 12, p19 

    The article proposes a data protection framework which authenticates, verifies and encrypt data transfer to maintain data confidentiality in cloud environment. Data protection is a critical issue in cloud computing since it has no boarders where data can be physically located in the world. This...

  • SECURING VIRTUAL IMAGES USING BLIND AUTHENTICATION PROTOCOL. PEELUKHANA, RAVIKIRAN; SHANTHI BALA, P.; AGHILA, G. // International Journal of Engineering Science & Technology;2011, Vol. 3 Issue 4, p2857 

    The cloud virtualization technology improves the economy of scale for data centers through server consolidation, application consolidation and resources consolidation. Virtualization allows the provider to move Virtual Images from more congested host to less-congested hosts, as required....

  • Alliance Develops Five New Security Models. Stewart, Jackie // American Banker;4/9/2012, Vol. 177 Issue 54, p6 

    The article announces the information technology consortium Open Data Center Alliance developed five security usage models and released an overview document about identity management in cloud computing.

  • What's at stake in the cloud? Hayden, Michael // Hill;10/5/2011, Vol. 18 Issue 135, p32 

    The author reflects on the federal strategy to implement cloud-computing solutions in the U.S. Government, wherein he notes the transition to cloud computing will give a chance for the government to change the blemished security paradigm.

  • Put Your Head in The Cloud. Stanbridge, Dean // Pest Management Professional;Apr2012, Vol. 80 Issue 4, p68 

    The article offers information about cloud-based technology which ensures data security.

  • Getting your head out of the clouds. OKURA, PAUL // Westchester County Business Journal;9/5/2011, Vol. 47 Issue 36, p15 

    The article looks on the risks and pitfalls of cloud computing, while it has several benefits, which include data security, application performance, and budget impact.

  • 30 seconds on...  // SC Magazine: For IT Security Professionals (15476693);Apr2014, Vol. 25 Issue 4, p16 

    The article discusses various ways for companies to evaluate third party providers including asking questions, checking the authentication on providing proper implementation and using deductive reasoning for avoiding breach that might cause business interruption, brand damage or sanctions.

  • Transformation from Identity Stone Age to Digital Identity. Kohli, Mohit // International Journal of Network Security & Its Applications;May2011, Vol. 3 Issue 3, p121 

    Technological conversion, political interests and Business drivers has triggered a means, to establish individual characterization and personalization. People started raising concerns on multiple identities managed across various zones and hence various solutions were designed Technological...

  • Inside the Identity Management Game. Lynch, Lucy // IEEE Internet Computing;Sep2011, Vol. 15 Issue 5, p78 

    Techniques for managing authentication and authorization are critical to the next round of Internet innovation. Cloud-based services, the social Web, and rapidly expanding mobile platforms will depend on identity management to provide a seamless user experience. Although a number of standards...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics