sponsored by Intel
Posted:  10 May 2011
Published:  10 May 2011
Format:  PDF
Length:  24  Page(s)
Type:  White Paper
Language:  English
ABSTRACT:

Traditional access security models have focused on privileged data user access; trusted and anonymous user access; and application access control for data, applications and networks. But security requirements in private, public, and hybrid cloud models have evolved beyond traditional measures.

Find out how to ensure that your critical data is secure in the cloud. Learn how the authorization domains model can be used to enforce a consistent security policy in your cloud computing applications.  






BROWSE RELATED RESOURCES
Access Control | Access Rights | Authentication | Authorization | Cloud Computing | Cloud Security | Identity Management | Security Management

View All Resources sponsored by Intel

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement