Login / Signup
Next generation computing: the rise of the utility in a future that is cloudy with scattered security.
Jim Stikeleather
Published in:
CSIIRW (2010)
Keyphrases
</>
long term
information security
network management
information assurance
security requirements
web intelligence
network security
utility function
intrusion detection
access control
real world
security mechanisms
data security
security policies
decision making
key management
paradigm shift
security model
security properties
privacy requirements
security vulnerabilities
neural network