Evaluating cloud deployment scenarios based on security and privacy requirements.
Christos KalloniatisHaralambos MouratidisShareeful IslamPublished in: Requir. Eng. (2013)
Keyphrases
- privacy requirements
- data security
- privacy preserving
- privacy preservation
- privacy protection
- private information
- access control
- cloud computing
- data privacy
- data publishing
- information security
- data centric
- intrusion detection
- privacy preserving data mining
- statistical databases
- privacy concerns
- privacy issues
- real world
- data sets
- personal information
- information management
- data quality
- object oriented