

Author: Joshi Karuna P. Yesha Yelena Finin Tim Yesha Yaacov
Publisher: Inderscience Publishers
ISSN: 2043-9989
Source: International Journal of Cloud Computing, Vol.2, Iss.2-3, 2013-07, pp. : 288-303
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content










Forthcoming Contributions: Policy-Based Management
Journal of Network and Systems Management, Vol. 11, Iss. 3, 2003-09 ,pp. :