Login / Signup

Cloud Computing Security Requirements and a Methodology for Their Auditing.

Dimitra GeorgiouCostas Lambrinoudakis
Published in: e-Democracy (2015)
Keyphrases