Hypertext Transfer Protocol [chapter]

2013 Encyclopedia of Systems Biology  
Users are outsourcing their sensitive data to cloud providers because of this data security and access control is one of the most challenging ongoing research work in cloud computing. Solutions such as cryptographic techniques to mitigate the security and access control problems are used. Various methods for security are presented in this paper.
doi:10.1007/978-1-4419-9863-7_100652 fatcat:3zweulizxnhe7ljo5vwmsnqy6m