Using Cloud Computing to Implement a Security Overlay...

  • Main
  • 2012
  • Using Cloud Computing to Implement a Security Overlay...

Using Cloud Computing to Implement a Security Overlay Network

Salah, Khaled, Alcaraz Calero, Jose Maria, Zeadally, Sherali, Almulla, Sameera, ZAaabi, Mohammed
How much do you like this book?
What’s the quality of the file?
Download the book for quality assessment
What’s the quality of the downloaded files?
Year:
2012
Language:
english
Journal:
IEEE Security & Privacy Magazine
DOI:
10.1109/MSP.2012.88
File:
PDF, 586 KB
english, 2012
Conversion to is in progress
Conversion to is failed