Information Security in the Cloud: Should We be Using a Different Approach?
Bob DuncanMark WhittingtonPublished in: CloudCom (2015)
Keyphrases
- information security
- cloud computing
- countermeasures
- security issues
- intrusion detection
- smart card
- information systems
- network security
- computer security
- security requirements
- cyber defense
- information assurance
- smart grid
- information security management
- security level
- sensitive data
- e government
- design theory
- data security
- information technology
- technical issues
- risk analysis
- iso iec
- data center
- security risks
- data management
- privacy concerns
- decision support system