Managing cloud security in the presence of strategic hacker and joint responsibility.
Yong WuZi KangTao DaiDong ChengPublished in: J. Oper. Res. Soc. (2024)
Keyphrases
- network security
- cloud computing
- information security
- security policies
- intrusion detection
- cloud storage
- information warfare
- information assurance
- access control
- cloud computing environment
- security requirements
- decision making
- security issues
- security problems
- computer networks
- information systems
- key management
- computer security
- security systems
- computing infrastructure
- database
- data security
- service management
- security management
- intrusion detection system
- knowledge management
- social networks