{"title":"云环境下地理空间信息处理的安全考虑","authors":"A. Matheus","doi":"10.1109/COMGEO.2013.13","DOIUrl":null,"url":null,"abstract":"The strength of cloud computing is that it dramatically reduces the investment costs for users, required for processing high-volume geospatial data. But in order to have confidential or even classified geospatial data processed in the cloud, service level agreements must ensure the seamless protection of the data. This paper introduces standards for the implementation of security requirements applicable to cloud computing and discusses the concerns towards secure processing of information in the cloud.","PeriodicalId":383309,"journal":{"name":"2013 Fourth International Conference on Computing for Geospatial Research and Application","volume":"8 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Security Considerations on Processing of Geospatial Information in the Cloud\",\"authors\":\"A. Matheus\",\"doi\":\"10.1109/COMGEO.2013.13\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The strength of cloud computing is that it dramatically reduces the investment costs for users, required for processing high-volume geospatial data. But in order to have confidential or even classified geospatial data processed in the cloud, service level agreements must ensure the seamless protection of the data. This paper introduces standards for the implementation of security requirements applicable to cloud computing and discusses the concerns towards secure processing of information in the cloud.\",\"PeriodicalId\":383309,\"journal\":{\"name\":\"2013 Fourth International Conference on Computing for Geospatial Research and Application\",\"volume\":\"8 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-07-22\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2013 Fourth International Conference on Computing for Geospatial Research and Application\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/COMGEO.2013.13\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 Fourth International Conference on Computing for Geospatial Research and Application","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/COMGEO.2013.13","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Security Considerations on Processing of Geospatial Information in the Cloud
The strength of cloud computing is that it dramatically reduces the investment costs for users, required for processing high-volume geospatial data. But in order to have confidential or even classified geospatial data processed in the cloud, service level agreements must ensure the seamless protection of the data. This paper introduces standards for the implementation of security requirements applicable to cloud computing and discusses the concerns towards secure processing of information in the cloud.