O'Reilly logo

The Cloud Security Ecosystem by Raymond Choo, Ryan Ko

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 7

Protecting digital identity in the cloud

Clare Sullivan    School of Law, University of South Australia, Adelaide, Australia

Abstract

This chapter considers the threat to digital identity posed by cloud computing and the regulation of cross-border data in that context.

The relative flexibility and cost effectiveness of cloud computing has led to its extensive use by both governments and the private sector. Digital identity is considered in this environment because of the increasing significance of this new concept of identity and because cloud computing has transformed the traditional notion of cross-border data and its regulation

Digital identity is now is being embedded into processes fundamental to economic and social order as ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required