The need, use and efficiency of trustworthy security model in Cloud computing for information assurance

Kishore Bhamidipati*, S. Karanth Shyam

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Fingerprint

Dive into the research topics of 'The need, use and efficiency of trustworthy security model in Cloud computing for information assurance'. Together they form a unique fingerprint.

INIS

Computer Science