A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Requirements Capture and Comparative Analysis of Cloud Security Techniques
2015
International Journal of Grid and Distributed Computing
Convergence and ubiquity are the key characteristics of tomorrow's service provision infrastructures. Today, Cloud architectures offer cost-efficient backbones that support transmission, storage, and computing of applications contents. These architectures can be used for business, scientific, and other computing purposes. However, the diversity of these services, delivered through Cloud infrastructures, increases its vulnerability to security incidents and attacks. The requirements for cost and
doi:10.14257/ijgdc.2015.8.2.25
fatcat:2vjojoyr5be7xpc7kal77mssqy