Table of Contents

 1     Scope          
 2     References
 3     Definitions
        3.1     Terms defined elsewhere       
        3.2     Terms defined in this Recommendation           
 4     Abbreviations and acronyms             
 5     Conventions            
 6     Overview of trusted inter-cloud       
        6.1     Governance of trusted inter-cloud      
        6.2     Management of trusted inter-cloud   
        6.3     Resiliency of trusted inter-cloud          
        6.4     Security and confidentiality of trusted inter-cloud        
        6.5     Relationship between trusted inter-cloud and the cloud computing reference architecture    
 7     General requirements for trusted inter-cloud            
        7.1     Data separation          
        7.2     Data annotation          
        7.3     Confidentiality of data              
        7.4     Operational statistics
        7.5     Interoperability and dependability      
        7.6     Master service agreement     
 8     Requirements for governance of trusted inter-cloud              
        8.1     Geographical policies
        8.2     Governance policies  
        8.3     Governance roles       
        8.4     Regulatory policies     
        8.5     Laws and regulations
 9     Requirements for management of trusted inter-cloud           
        9.1     Management policies
        9.2     Management roles    
        9.3     Distributed data          
        9.4     Identity management
        9.5     Access management 
        9.6     Policy language           
10     Requirements for resiliency of trusted inter-cloud 
       10.1     Service monitoring   
       10.2     Service continuity     
       10.3     Resiliency policies     
       10.4     Resiliency validation
11     Requirements for security and confidentiality of trusted inter-cloud              
       11.1     Security and confidentiality policies  
       11.2     Level of robustness  
       11.3     Security policy negotiation    
       11.4     Security and confidentiality policy      
       11.5     Data security               
       11.6     Security policy monitoring     
12     Security considerations      
Appendix I  Use case of trusted inter-cloud computing    
        I.1     Use case template      
        I.2     Trusted inter-cloud related use cases  
Bibliography