Skip to main content

Table 1 Summary of the topics considered in each approach

From: An analysis of security issues for cloud computing

Topics/References

[4]

[6]

[10]

[16]

[17]

[18]

[19]

[20]

[21]

[22]

[23]

[24]

[25]

[26]

[27]

Vulnerabilities

 

X

 

X

X

X

X

X

X

  

X

  

X

Threats

 

X

 

X

X

X

X

X

X

X

X

X

X

X

X

Mechanisms/Recommendations

X

  

X

 

X

 

X

   

X

X

X

X

Security Standards

      

X

  

X

     

Data Security

X

 

X

   

X

 

X

 

X

 

X

 

X

Trust

  

X

       

X

 

X

X

X

Security Requirements

X

 

X

     

X

 

X

  

X

X

SaaS, PaaS, IaaS Security

    

X

   

X

  

X