Intel® Cloud Builders Guide: Cloud Design and Deployment with Intel® Platforms

Intel® Cloud Builders Guide: Cloud Design and Deployment with Intel® Platforms

Cover

Traditional access security models have focused on privileged data user access; trusted and anonymous user access; and application access control for data, applications and networks. But security requirements in private, public, and hybrid cloud models have evolved beyond traditional measures.

Find out how to ensure that your critical data is secure in the cloud. Learn how the authorization domains model can be used to enforce a consistent security policy in your cloud computing applications.  

Vendor:
Intel
Posted:
10 May 2011
Published
10 May 2011
Format:
PDF
Length:
24 Page(s)
Type:
White Paper
Language:
English
Already a Bitpipe member? Login here

Download this White Paper!

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy