Abstract | ||
---|---|---|
Despite of the several benefits of migrating enterprise critical assets to the cloud, there are challenges specifically related to security and privacy. It is important that cloud users understand their security and privacy needs, based on their specific context and select cloud model best fit to support these needs. The literature provides works that focus on discussing security and privacy issue... |
Year | DOI | Venue |
---|---|---|
2018 | 10.1109/TCC.2015.2511719 | IEEE Transactions on Cloud Computing |
Keywords | Field | DocType |
Cloud computing,Security,Privacy,Standards,Computational modeling,Data privacy,Context | Privacy by Design,Computer science,Computer security,Software security assurance,Requirements engineering,Security analysis,Cloud computing security,Information privacy,Privacy software,Cloud computing | Journal |
Volume | Issue | ISSN |
6 | 2 | 2168-7161 |
Citations | PageRank | References |
0 | 0.34 | 0 |
Authors | ||
5 |
Name | Order | Citations | PageRank |
---|---|---|---|
Shareeful Islam | 1 | 292 | 25.60 |
Moussa Ouedraogo | 2 | 69 | 8.71 |
Christos Kalloniatis | 3 | 312 | 32.39 |
Haralambos Mouratidis | 4 | 991 | 76.97 |
Stefanos Gritzalis | 5 | 1194 | 122.43 |