Foreword
Introduction
1 Scope
2 Normative references
3 Terms and definitions
4 Symbols and abbreviated terms
5 Relationship with other parts of the cloud computing
SLA framework
6 Overview
7 Information security components
8 Protection of personally identifiable information component
Bibliography