O'Reilly logo

The Cloud at Your Service: The when, how, and why of enterprise cloud computing by Arthur Mateos, Jothy Rosenberg

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Appendix A. Information security refresher

In this appendix, we’ll review the basics of information security that will help you understand how security in the cloud works. We’ll cover six topics:

  • Secret communications
  • Keys
  • Shared-key cryptography
  • Public-key cryptography
  • XML Signature
  • XML Encryption

These topics are relevant because cloud providers, having based their services on web services, all use these security technologies in their everyday operations. As you’ll see, keys are issued the moment you sign up for cloud services. The APIs used to create and control machine instances all use one or more of these means to keep your operations secret and secure. Let’s begin with the concept of secret communications.

Secret communications ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required