Login / Signup
Security architecture for cloud networking.
Volker Fusenig
Ayush Sharma
Published in:
ICNC (2012)
Keyphrases
</>
security architecture
access control
cloud computing
security policies
distributed computing
security model
data integrity
simulation platform
intrusion detection system
security mechanisms
computing platform
intrusion detection
data mining
data mining techniques
public key