Abstract
No abstract available.
Cited By
- Sanders M and Yue C Minimizing Privilege Assignment Errors in Cloud Services Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, (2-12)
- Subramanian V, Seker R, Bian J and Kanaskar N Collaborations, mergers, acquisitions, and security policy conflict analysis Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research, (1-1)
- Krautheim F Private virtual infrastructure for cloud computing Proceedings of the 2009 conference on Hot topics in cloud computing
- Crowley E (2009). Designing applied cryptology laboratory modules with free and open source software, Journal of Computing Sciences in Colleges, 24:4, (61-67), Online publication date: 1-Apr-2009.
Please enable JavaScript to view thecomments powered by Disqus.