Login / Signup
Security Mapping of a Usage Based Cloud System.
Kamatchi R
Kimaya Ambekar
Yash Parikh
Published in:
Netw. Protoc. Algorithms (2016)
Keyphrases
</>
information security
intrusion detection
information assurance
security systems
security issues
access control
security mechanisms
computer security
security problems
security threats
statistical databases
security requirements
data mining
information systems
cyber security