8 Deep Dive on Popular Security Models and Strategies of Cloud Computing
K. Venkatesh
Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology
R. Velvizhi, K. Selva Banu Priya, and N. Sivaranjani
Bharath Institute of Higher Education and Research
CONTENTS
8.1 Access Control Mechanisms in Cloud Computing
8.1.1 Discretionary Access Control Mechanism
8.1.2 Mandatory Access Control Mechanism
8.1.3 Role-Based Access Control Mechanism
8.2 Secure Deployment Strategies of Cloud Platform
8.3 Novel Key Management Practices in Cloud
8.3.1 Key Management at Client Side
Get Privacy and Security Challenges in Cloud Computing now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.