Login / Signup

A Structured Method for Security Requirements Elicitation concerning the Cloud Computing Domain.

Kristian BeckersIsabelle CôtéLudger GoekeSelim GülerMaritta Heisel
Published in: Int. J. Secur. Softw. Eng. (2014)
Keyphrases
  • cloud computing
  • real world
  • artificial intelligence
  • data center
  • computing resources
  • requirements elicitation
  • data mining
  • case study
  • service providers
  • big data
  • security issues