Protecting confidentiality, integrity and availability (CIA) is probably the most controversially discussed subject around cloud computing. Similar to conventional deployment models of SAP, we need to be able to protect the software, hardware and communication end to end.
Cloud Computing Cloud Provider Public Cloud Private Cloud Guest Operating System
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
This is a preview of subscription content, log in to check access