Login / Signup
Secure benchmarking in the cloud.
Axel Schröpfer
Andreas Schaad
Florian Kerschbaum
Heiko Boehm
Joerg Jooss
Published in:
SACMAT (2013)
Keyphrases
</>
cloud computing
security issues
private cloud
cloud storage
virtual machine
stream cipher
trusted computing
cryptographic protocols
scalar product
covert channel
key exchange protocol
security management
identity management
data sets
user authentication
map reduce
standard model
cost effective
data mining