An investigation into cloud configuration and security.
Katie WoodElla PereiraPublished in: ICITST (2010)
Keyphrases
- cloud computing
- security policies
- security requirements
- cloud computing environment
- information security
- security issues
- intrusion detection
- cloud storage
- statistical databases
- computer security
- computing infrastructure
- access control
- functional requirements
- security mechanisms
- security systems
- security problems
- security threats
- security management
- virtual machine
- information assurance
- cyber security
- cryptographic protocols
- security properties
- optimal configuration
- network security