From the Enterprise Perimeter to a Mobility-Enabled Secure Cloud.
Edward AmorosoPublished in: IEEE Secur. Priv. (2013)
Keyphrases
- cloud computing
- security management
- cloud services
- data analytics
- private cloud
- cloud storage
- mobile agents
- security issues
- cloud platform
- human mobility
- identity management
- security requirements
- information systems
- quadtree
- databases
- mobile users
- multi party
- security mechanisms
- key management
- computing platform
- security protocols
- authentication protocol
- enterprise systems
- information management
- data center
- smart card
- convex hull
- service providers
- mobility patterns
- distributed systems
- sensor networks