Network Security Evaluation Model Based on Cloud Computing.
Jin YangCilin WangLe YuCaiming LiuLingxi PengPublished in: ICICA (2) (2012)
Keyphrases
- cloud computing
- network security
- network access
- computing resources
- traffic analysis
- computer networks
- data center
- intrusion detection
- data management
- information security
- service providers
- intrusion detection system
- cloud computing environment
- network traffic
- security policies
- distributed computing
- security issues
- anomaly detection
- business models
- cloud computing platform
- computer security
- cloud storage
- load balancing
- energy consumption
- e government