Login / Signup
A Structured Method for Security Requirements Elicitation concerning the Cloud Computing Domain.
Kristian Beckers
Isabelle Côté
Ludger Goeke
Selim Güler
Maritta Heisel
Published in:
Int. J. Secur. Softw. Eng. (2014)
Keyphrases
</>
cloud computing
real world
artificial intelligence
data center
computing resources
requirements elicitation
data mining
case study
service providers
big data
security issues