Recent Changes - Search:

Menu




WikiSandbox

Text Formatting Rules()


hahaSGFXGVVCV

  • The weakness of Cloud Computing
American University of San Diego and MIT researchers recently published papers, exposing potential security weaknesses in cloud computing, through the Cross-VM methods of attack, may lead to a series of security problems.

They use the Amazon's Elastic Compute Cloud (EC2) platform as the main example, combine to use side channel approach, detection and get the relevant information and operation status from the target.

Edit - History - Print - Recent Changes - Search
Page last modified on March 09, 2016, at 07:59 pm UTC