Intel® Cloud Builders Guide: Cloud Design and Deployment with Intel® Platforms

Traditional access security models have focused on privileged data user access; trusted and anonymous user access; and application access control for data, applications and networks. But security requirements in private, public, and hybrid cloud models have evolved beyond traditional measures.
Find out how to ensure that your critical data is secure in the cloud. Learn how the authorization domains model can be used to enforce a consistent security policy in your cloud computing applications.