Intel® Cloud Builders Guide: Cloud Design and Deployment with Intel® Platforms

Cover Image

Traditional access security models have focused on privileged data user access; trusted and anonymous user access; and application access control for data, applications and networks. But security requirements in private, public, and hybrid cloud models have evolved beyond traditional measures.

Find out how to ensure that your critical data is secure in the cloud. Learn how the authorization domains model can be used to enforce a consistent security policy in your cloud computing applications.  

Vendor:
Intel
Posted:
Feb 8, 2021
Published:
May 10, 2011
Format:
PDF
Type:
White Paper
Already a Bitpipe member? Log in here

Download this White Paper!