Modelling threats with security requirements in cloud storage
Modelling threats with security requirements in cloud storage
551-558
Yahya, Fara
2f3a6384-6b79-43cb-9fee-3178c75ad2fa
Walters, Robert
7b8732fb-3083-4f4d-844e-85a29daaa2c1
Wills, Gary
3a594558-6921-4e82-8098-38cd8d4e8aa0
June 2015
Yahya, Fara
2f3a6384-6b79-43cb-9fee-3178c75ad2fa
Walters, Robert
7b8732fb-3083-4f4d-844e-85a29daaa2c1
Wills, Gary
3a594558-6921-4e82-8098-38cd8d4e8aa0
Yahya, Fara, Walters, Robert and Wills, Gary
(2015)
Modelling threats with security requirements in cloud storage.
International Journal for Information Security Research (IJISR), 5 (2), .
(doi:10.20533/ijisr.2042.4639.2015.0063).
Text
Modelling-Threats-with-Security-Requirements-in-Cloud-Storage.pdf
- Version of Record
Restricted to Registered users only
Request a copy
More information
e-pub ahead of print date: 1 June 2015
Published date: June 2015
Organisations:
Electronics & Computer Science
Identifiers
Local EPrints ID: 400652
URI: http://eprints.soton.ac.uk/id/eprint/400652
ISSN: 2042-4639
PURE UUID: aef33fd7-231c-4c60-a721-eb72d67cd0c8
Catalogue record
Date deposited: 21 Sep 2016 10:45
Last modified: 15 Mar 2024 02:51
Export record
Altmetrics
Contributors
Author:
Fara Yahya
Author:
Robert Walters
Author:
Gary Wills
Download statistics
Downloads from ePrints over the past year. Other digital versions may also be available to download e.g. from the publisher's website.
View more statistics