Login / Signup
Application of a Distributed Security Method to End-2-End Services Security in Independent Heterogeneous Cloud Computing Environments.
Pankaj Goyal
Published in:
SERVICES (2011)
Keyphrases
</>
computing environments
trusted computing
multi agent
intrusion detection
distributed environment
mobile environments
highly distributed
access control
information security
cooperative
security requirements
security mechanisms
computing platform
encryption algorithm
network services
group communication