Login / Signup

Microsoft and Amazon: A comparison of approaches to cloud security.

Golnoosh TajadodLynn Margaret BattenGovinda Kannayaram
Published in: CloudCom (2012)
Keyphrases
  • cloud computing
  • security requirements
  • access control
  • intrusion detection
  • security mechanisms
  • database
  • data mining
  • decision trees
  • data mining techniques
  • business intelligence
  • security policies