Login / Signup

Identifying and Utilizing Dependencies Across Cloud Security Services.

Ahmed TahaPatrick MetzlerRubén TraperoJesus LunaNeeraj Suri
Published in: AsiaCCS (2016)
Keyphrases
  • security services
  • security protocols
  • personal information
  • security mechanisms
  • key management
  • cloud computing
  • government services
  • real time
  • authentication mechanism
  • digital libraries