Login / Signup

Security Concept and Implementation for a Cloud Based E-science Infrastructure.

Thomas LudescherThomas FeilhauerPeter Brezany
Published in: ARES (2012)
Keyphrases
  • data mining
  • artificial intelligence
  • security services
  • security policies
  • access control
  • intrusion detection
  • network security
  • information security
  • computing environments
  • identity management