Cloud Computing Security Requirements and a Methodology for Their Auditing.
Dimitra GeorgiouCostas LambrinoudakisPublished in: e-Democracy (2015)
Keyphrases
- cloud computing
- security requirements
- access control
- computing resources
- smart card
- cloud computing environment
- security mechanisms
- data management
- security policies
- big data
- data center
- security analysis
- information security
- software architecture
- service providers
- cloud computing platform
- security issues
- data privacy
- database