Abstract
Despite the potential benefits, cost savings and revenues that can be gained from adopting the cloud computing model, a downside is that it increases malicious attackers' interest and ability to find vulnerabilities to exploit in cloud software and/or infrastructure.
| Original language | English |
|---|---|
| Title of host publication | Security, Privacy and Trust in Cloud Systems |
| Publisher | Springer-Verlag London Ltd. |
| Pages | 73-102 |
| Number of pages | 30 |
| Volume | 9783642385865 |
| ISBN (Electronic) | 9783642385865 |
| ISBN (Print) | 3642385850, 9783642385858 |
| DOIs | |
| Publication status | Published - 1 Jun 2013 |
| Externally published | Yes |
Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver