Preservation of Security Configurations in the Cloud.
Arash EghtesadiYosr JarrayaMourad DebbabiMakan PourzandiPublished in: IC2E (2014)
Keyphrases
- cloud computing
- cloud storage
- cloud computing environment
- access control
- information security
- security issues
- intrusion detection
- cloud services
- security threats
- security policies
- security requirements
- network management
- security problems
- computer security
- network security
- database
- security management
- key management
- computing infrastructure
- functional requirements
- data security
- information assurance
- security level
- security systems
- security model
- cyber security
- biometric systems
- electronic commerce
- e government
- database systems
- data mining