Login / Signup
Microsoft and Amazon: A comparison of approaches to cloud security.
Golnoosh Tajadod
Lynn Margaret Batten
Govinda Kannayaram
Published in:
CloudCom (2012)
Keyphrases
</>
cloud computing
security requirements
access control
intrusion detection
security mechanisms
database
data mining
decision trees
data mining techniques
business intelligence
security policies