Login / Signup
Securing cloud-based computations against malicious providers.
Adil Bouti
Jörg Keller
Published in:
ACM SIGOPS Oper. Syst. Rev. (2012)
Keyphrases
</>
cloud computing
end users
service providers
information security
malicious behavior
detect malicious
data sets
information technology
identity management
malicious code
real world
network traffic
online services
malicious users