Accessing Cloud through API in a More Secure and Usable Way.
HonGian Karen LuPublished in: WOSIS (2011)
Keyphrases
- cloud computing
- cloud storage
- private cloud
- security issues
- source code
- application programming interface
- identity management
- third party
- security analysis
- method invocation
- computing platform
- key management
- authentication scheme
- security requirements
- multi party
- virtual machine
- covert channel
- data center
- information security