

Author: Fernandez Eduardo B. Ajaj Ola Buckley Ingrid Delessy-Gassant Nelly Hashizume Keiko Larrondo-Petrie Maria M.
Publisher: MDPI
E-ISSN: 1999-5903|4|2|430-450
ISSN: 1999-5903
Source: Future Internet, Vol.4, Iss.2, 2012-04, pp. : 430-450
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content






Cloud Computing Security: A Survey
By Khalil Issa M. Khreishah Abdallah Azeem Muhammad
Computers, Vol. 3, Iss. 1, 2014-02 ,pp. :

