Security-Based Adaptation of Multi-cloud Applications.
Kyriakos KritikosPhilippe MassonetPublished in: DPM/QASA@ESORICS (2015)
Keyphrases
- cloud computing
- access control
- information security
- security issues
- cloud storage
- factor authentication
- user authentication
- cloud computing environment
- security problems
- network security
- intrusion detection
- security policies
- security level
- security threats
- cloud services
- computing infrastructure
- security vulnerabilities
- statistical databases
- virtual machine
- data sets
- security properties
- security management
- network access
- database systems
- neural network