Login / Signup
Security Concept and Implementation for a Cloud Based E-science Infrastructure.
Thomas Ludescher
Thomas Feilhauer
Peter Brezany
Published in:
ARES (2012)
Keyphrases
</>
data mining
artificial intelligence
security services
security policies
access control
intrusion detection
network security
information security
computing environments
identity management