Login / Signup
Analyzing transparency and malicious insiders prevention for cloud computing environment.
Syed Rizvi
Iyonna Williams
Published in:
Comput. Secur. (2024)
Keyphrases
</>
cloud computing environment
cloud computing
insider threat
load balancing
open architecture
virtual machine
distributed computing
database
databases
database systems
response time
data management
electronic commerce