Sign Up to like & get
recommendations!
1
Published in 2017 at "IEEE Transactions on Services Computing"
DOI: 10.1109/tsc.2016.2553668
Abstract: Most current security solutions are based on perimeter security. However, Cloud computing breaks the organization perimeters. When data resides in the Cloud, they reside outside the organizational bounds. This leads users to a loos of…
read more here.
Keywords:
control;
data clouds;
security;
service provider ... See more keywords