Login / Signup
For cloud services on a user's multiple devices, how do we measure the trusted zone defended by anti-malware?
Anthony Arrott
Ivan Macalintal
Ian McMillan
Published in:
CyberSA (2017)
Keyphrases
</>
mobile devices
user interface
cloud services
cloud computing
end users
user interaction
computing resources
case study
computer systems
user profiles
user preferences
data center