Security requirements for cloud computing

Identification and Authenticity:
Authorization
Non-repudiation

Availability

Comments

Popular posts from this blog

Cloud service models

Network level attacks

Types of clouds