X.1647: Security guidelines for selecting computing methods and resources from Cloud Service Providers
With the development of cloud computing, computing tasks can be outsourced to external computing resources for computation. However, computing resources differ in the security levels they offer, and computing tasks differ in their security requirements. To mitigate the security threats introduced by insecure computing resources and satisfy the security requirements of computing tasks, secure computation methods can be applied.
This Recommendation provides guidelines for the selection of secure computation methods and resources from cloud service providers (CSPs) to help service customers or stakeholders to execute outsourcing computation in a way that meets their security requirements.
AAP Current Status
Step # | Action |
Start / End |
Status | Announcement | Related documents | Comments / Resolution logs |
---|