Login / Signup

For cloud services on a user's multiple devices, how do we measure the trusted zone defended by anti-malware?

Anthony ArrottIvan MacalintalIan McMillan
Published in: CyberSA (2017)
Keyphrases
  • mobile devices
  • user interface
  • cloud services
  • cloud computing
  • end users
  • user interaction
  • computing resources
  • case study
  • computer systems
  • user profiles
  • user preferences
  • data center