Login / Signup
Cost and Effect of Using Scheduling Security Model in a Cloud Environment.
Abdullah Sheikh
Malcolm Munro
David Budgen
Published in:
CSCloud/EdgeCom (2019)
Keyphrases
</>
security model
public key
access control
security requirements
security analysis
scheduling algorithm
scheduling problem
provably secure
real time
data streams
quality of service
public key cryptography
designated verifier