Security requirements for cloud computing

Identification and Authenticity:
Authorization
Non-repudiation

Availability

Comments

Popular posts from this blog

CSP level attacks

What is Cloud Computing?