Security requirements for cloud computing

Identification and Authenticity:
Authorization
Non-repudiation

Availability

Comments

Popular posts from this blog

What is Cloud Computing?

Cloud service models