

Publisher: IGI Global_journal
E-ISSN: 2156-1826|4|1|45-49
ISSN: 2156-1834
Source: International Journal of Cloud Applications and Computing (IJCAC), Vol.4, Iss.1, 2014-01, pp. : 45-49
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content








Hybrid Data Security Model for Cloud
International Journal of Cloud Applications and Computing (IJCAC), Vol. 3, Iss. 3, 2013-07 ,pp. :