Intel® Cloud Builders Guide: Cloud Design and Deployment with Intel® Platforms

Intel® Cloud Builders Guide: Cloud Design and Deployment with Intel® Platforms

Cover

Traditional access security models have focused on privileged data user access; trusted and anonymous user access; and application access control for data, applications and networks. But security requirements in private, public, and hybrid cloud models have evolved beyond traditional measures.

Find out how to ensure that your critical data is secure in the cloud. Learn how the authorization domains model can be used to enforce a consistent security policy in your cloud computing applications.  

Vendor:
Intel
Posted:
10 May 2011
Published:
10 May 2011
Format:
PDF
Length:
24 Page(s)
Type:
White Paper
Language:
English
Already a Bitpipe member? Login here

Download this White Paper!

By submitting your personal information, you agree to receive emails regarding relevant products and special offers from TechTarget and its partners. You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.