Table of Contents

 1     Scope            
 2     References 
 3     Definitions  
        3.1     Terms defined elsewhere            
        3.2     Terms defined in this Recommendation  
 4     Abbreviations and acronyms 
 5     Conventions
 6     Overview of trusted inter-cloud            
        6.1     Governance of trusted inter-cloud            
        6.2     Management of trusted inter-cloud         
        6.3     Resiliency of trusted inter-cloud
        6.4     Security and confidentiality of trusted inter-cloud
        6.5     Relationship between trusted inter-cloud and the cloud computing reference architecture    
 7     General requirements for trusted inter-cloud  
        7.1     Data separation             
        7.2     Data annotation             
        7.3     Confidentiality of data  
        7.4     Operational statistics   
        7.5     Interoperability and dependability            
        7.6     Master service agreement          
 8     Requirements for governance of trusted inter-cloud      
        8.1     Geographical policies    
        8.2     Governance policies      
        8.3     Governance roles           
        8.4     Regulatory policies        
        8.5     Laws and regulations    
 9     Requirements for management of trusted inter-cloud  
        9.1     Management policies   
        9.2     Management roles        
        9.3     Distributed data             
        9.4     Identity management   
        9.5     Access management     
        9.6     Policy language               
10     Requirements for resiliency of trusted inter-cloud         
       10.1     Service monitoring        
       10.2     Service continuity          
       10.3     Resiliency policies         
       10.4     Resiliency validation     
11     Requirements for security and confidentiality of trusted inter-cloud        
       11.1     Security and confidentiality policies         
       11.2     Level of robustness      
       11.3     Security policy negotiation         
       11.4     Security and confidentiality policy            
       11.5     Data security 
       11.6     Security policy monitoring          
12     Security considerations          
Appendix I  Use case of trusted inter-cloud computing    
        I.1     Use case template          
        I.2     Trusted inter-cloud related use cases       
Bibliography