Skip to main content

Table 1 Summary of the topics considered in each approach

From: An analysis of security issues for cloud computing

Topics/References [4] [6] [10] [16] [17] [18] [19] [20] [21] [22] [23] [24] [25] [26] [27]
Vulnerabilities   X   X X X X X X    X    X
Threats   X   X X X X X X X X X X X X
Mechanisms/Recommendations X    X   X   X     X X X X
Security Standards        X    X      
Data Security X   X     X   X   X   X   X
Trust    X         X   X X X
Security Requirements X   X       X   X    X X
SaaS, PaaS, IaaS Security      X     X    X