Login / Signup
Could the Outsourcing of Incident Response Management Provide a Blueprint for Managing Other Cloud Security Requirements?
Bob Duncan
Mark Whittington
Martin Gilje Jaatun
Alfredo Ramiro Reyes Zúñiga
Published in:
ES (2015)
Keyphrases
</>
security requirements
information systems
information technology
software architecture
smart card
mobile commerce
data mining
decision making
software engineering
open source
distributed systems
unsupervised learning
security model
security concerns