Login / Signup
Identifying and Utilizing Dependencies Across Cloud Security Services.
Ahmed Taha
Patrick Metzler
Rubén Trapero
Jesus Luna
Neeraj Suri
Published in:
AsiaCCS (2016)
Keyphrases
</>
security services
security protocols
personal information
security mechanisms
key management
cloud computing
government services
real time
authentication mechanism
digital libraries