Applying Security Policies in Small Business Utilizing Cloud Computing Technologies.
Louay KaradshehSamer Al HawariPublished in: Int. J. Cloud Appl. Comput. (2011)
Keyphrases
- computing technologies
- security policies
- cloud computing
- big data
- access control
- computing systems
- network security
- computing resources
- computer networks
- distributed systems
- data center
- digital data
- information systems
- data mining
- mobile computing
- virtual machine
- database
- high performance computing
- academia and industry
- business intelligence
- distributed computing
- power consumption
- multimedia