Developing Security Reputation Metrics for Hosting Providers.
Arman NoroozianMaciej KorczynskiSamaneh TajalizadehkhoobMichel van EetenPublished in: CoRR (2016)
Keyphrases
- end users
- information security
- security issues
- service providers
- security administration
- intrusion detection
- security requirements
- trust relationships
- trust management
- rfid tags
- sensitive data
- security mechanisms
- cloud computing
- reputation management
- access control
- computer security
- security protocols
- data security
- statistical databases