Sign in

A framework to support selection of cloud providers based on security and privacy requirements.

Haralambos MouratidisShareeful IslamChristos KalloniatisStefanos Gritzalis
Published in: J. Syst. Softw. (2013)
Keyphrases
  • privacy requirements
  • data security
  • end users
  • e government
  • data mining
  • intrusion detection
  • information security