Show simple item record

dc.contributor.authorDuncan, Bob
dc.contributor.authorWhittington, Mark
dc.date.accessioned2017-01-20T17:36:52Z
dc.date.available2017-01-20T17:36:52Z
dc.date.issued2015-11-30
dc.identifier69898005
dc.identifier6433bd94-0de1-42ff-a9cb-4495a8939391
dc.identifier84964395606
dc.identifier.citationDuncan , B & Whittington , M 2015 , Information Security in the Cloud: Should We be Using a Different Approach? in 2015 IEEE 7th International Conference on Cloud Computing Technology and Science (CloudCom) . Institute of Electrical and Electronics Engineers (IEEE) , pp. 523-528 , 2015 IEEE 7th International Conference on Cloud Computing Technology and Science (CloudCom) , Vancouver , Canada , 30/11/15 . https://doi.org/10.1109/CloudCom.2015.92en
dc.identifier.citationconferenceen
dc.identifier.isbn978-1-4673-9561-8
dc.identifier.isbn978-1-4673-9560-1
dc.identifier.urihttp://hdl.handle.net/2164/8042
dc.format.extent6
dc.format.extent155038
dc.language.isoeng
dc.publisherInstitute of Electrical and Electronics Engineers (IEEE)
dc.relation.ispartof2015 IEEE 7th International Conference on Cloud Computing Technology and Science (CloudCom)en
dc.subjectsecurityen
dc.subjectprivacyen
dc.subjectstandardsen
dc.subjectcomplianceen
dc.subjectassuranceen
dc.subjectauditen
dc.subjectmeasurementen
dc.subjectcloud service providersen
dc.subjectservice level agreementsen
dc.subjectthreat environmenten
dc.subjectQA75 Electronic computers. Computer scienceen
dc.subject.lccQA75en
dc.titleInformation Security in the Cloud: Should We be Using a Different Approach?en
dc.typeConference itemen
dc.contributor.institutionUniversity of Aberdeen.Financeen
dc.contributor.institutionUniversity of Aberdeen.Computing Scienceen
dc.contributor.institutionUniversity of Aberdeen.Accountancyen
dc.identifier.doi10.1109/CloudCom.2015.92


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record