Summary - X.1647 (10/2024) - Security guidelines for selecting computing methods and resources from cloud service providersWith the development of cloud computing, computing tasks can be outsourced to external computing resources for computation. However, computing resources differ in the security levels they offer, and computing tasks differ in their security requirements. To mitigate the security threats introduced by insecure computing resources and satisfy the security requirements of computing tasks, secure computation methods can be applied. |