Software Engineering Institute | Carnegie Mellon University
Software Engineering Institute | Carnegie Mellon University

Digital Library

Javascript is currently disabled for your browser. For an optimal search experience, please enable javascript.

Advanced Search

Basic Search

Content Type

Topics

Publication Date

Showing 1 - 8 of 8 results for the cloud computing Type - White Paper

White Paper | September 2010 - White Paper Cloud Computing Basics Explained By Grace Lewis

This paper seeks to help organizations understand cloud computing essentials, including drivers for and barriers to adoption, in support of making decisions about adopting the approach.

White Paper | November 2010 - White Paper Executive Overview: Best Practices for Adoption of Cloud ... By Grace Lewis

This paper describes the SEI approach to cloud computing research for the DoD.

White Paper | July 2012 - White Paper Insider Threats to Cloud Computing: Directions for New ... By William R. Claycomb, Alex Nicoll

In this paper, the authors explain how cloud computing related insider threats are a serious concern, but that this threat has not been thoroughly explored.

White Paper | June 2011 - White Paper Monitoring Cloud Computing by Layer, Part 2 By Jonathan Spring

In this paper, Jonathan Spring presents a set of recommended restrictions and audits to facilitate cloud security.

White Paper | April 2011 - White Paper Monitoring Cloud Computing by Layer, Part 1 By Jonathan Spring

In this paper, Jonathan Spring presents a set of recommended restrictions and audits to facilitate cloud security.

White Paper | April 2011 - White Paper Architectures for the Cloud: Best Practices for Navy Adoption ... By Grace Lewis

The goal of SEI research is to create best practices for architecture and design of systems that take advantage of the cloud, leading to greater system quality from both a consumer and provider perspective.

White Paper | October 2016 - White Paper Establishing Trusted Identities in Disconnected Edge ... By Sebastián Echeverría (Universidad de los Andes), Dan J. Klinedinst, Keegan M. Williams

he goal of this paper is to present a solution for establishing trusted identities in disconnected environments based on secure key generation and exchange in the field.

White Paper | December 2012 - White Paper Chronological Examination of Insider Threat Sabotage ... By William R. Claycomb, Carly L. Huth, Lori Flynn, David McIntire, Todd Lewellen

In this paper, the authors examine 15 cases of insider threat sabotage of IT systems to identify points in the attack time-line.