A Certification Technique for Cloud Security Adaptation.
Claudio Agostino ArdagnaRasool AsalErnesto DamianiNabil El IoiniClaus PahlTheo DimitrakosPublished in: SCC (2016)
Keyphrases
- cloud computing
- information security
- cloud storage
- security issues
- third party
- security requirements
- security management
- network security
- cloud computing environment
- information assurance
- security policies
- statistical databases
- computer security
- security systems
- access control
- security protocols
- security mechanisms
- data center
- authentication protocol
- database security
- user authentication
- security problems
- cloud services
- encryption scheme
- database