RUS  ENG
Full version
JOURNALS // Program Systems: Theory and Applications // Archive

Program Systems: Theory and Applications, 2015 Volume 6, Issue 1, Pages 61–71 (Mi ps154)

This article is cited in 1 paper

Hardware, software and distributed supercomputer systems

Cloud computing security perimeter

V. I. Vorobiev, S. R. Ryzhkov, R. R. Fatkieva

St. Petersburg Institute for Informatics and Automation of RAS

Abstract: Abstract concept of cloud data sealing by means of determinable policies is proposed. Use of TPM crypto modules for creation of trusted server platforms within the cloud is described. Generalized geo tagging scheme is presented. (In Russian).

Key words and phrases: cloud, cloud computing, security perimeter, geo tagging.

UDC: 004.75

Received: 26.12.2014
Accepted: 24.02.2015



© Steklov Math. Inst. of RAS, 2024