Journal

A structured bibliography is provided to assist research into the late-2013 status of cloud and data sovereignty (or ?digital protectionism?) policy discussions in Australia and elsewhere.

November 2013

Journal

A structured bibliography is provided to assist research into the late-2013 status of cloud and data sovereignty (or ?digital protectionism?) policy discussions in Australia and elsewhere.

November 2013

Journal

A structured bibliography is provided to assist research into the late-2013 status of cloud and data sovereignty (or ?digital protectionism?) policy discussions in Australia and elsewhere.

November 2013

Journal

This paper describes the activities of Cloud Sweden, a large group of IT and legal professionals in Sweden who collaborate to develop guidelines for safe use of cloud computing. In this article you will find a sample of what the legal group of Cloud Sweden has produced ? a primer of legal issues that a manager should pay attention to before making the leap into the Cloud.

November 2013

Journal

This paper describes the activities of Cloud Sweden, a large group of IT and legal professionals in Sweden who collaborate to develop guidelines for safe use of cloud computing. In this article you will find a sample of what the legal group of Cloud Sweden has produced ? a primer of legal issues that a manager should pay attention to before making the leap into the Cloud.

November 2013

Journal

Cloud computing inherently comes with a number of vulnerabilities that increase the space for cyber attacks. This paper aims to provide an overview of major potential risks to privacy and security in the cloud. Various emerging threats and attack methods are discussed, and some speculative future research directions are presented.

November 2013

Journal

Cloud computing inherently comes with a number of vulnerabilities that increase the space for cyber attacks. This paper aims to provide an overview of major potential risks to privacy and security in the cloud. Various emerging threats and attack methods are discussed, and some speculative future research directions are presented.

November 2013

Journal

Cloud computing inherently comes with a number of vulnerabilities that increase the space for cyber attacks. This paper aims to provide an overview of major potential risks to privacy and security in the cloud. Various emerging threats and attack methods are discussed, and some speculative future research directions are presented.

November 2013

Journal

An overview of cloud computing is given, describing its different deployment types, its service models, the parallel programming framework that underpins it, and the issues in security management and privacy regulation.

November 2013

Journal

An overview of cloud computing is given, describing its different deployment types, its service models, the parallel programming framework that underpins it, and the issues in security management and privacy regulation.

November 2013