Refine
Year of publication
- 2015 (15) (remove)
Document type
- Conference Proceeding (12)
- Report (2)
- Part of a Book (1)
Has full text
- No (15)
Is part of the Bibliography
- Yes (15)
Keywords
- Cloud computing (3)
- AAL (2)
- Accountability (2)
- Authentication (2)
- Biometrics (2)
- OSGi (2)
- PaaS (2)
- Privacy (2)
- Security (2)
- Usability (2)
- Assurance (1)
- Authentication technologies (1)
- Cloud (1)
- Cloud Computing (1)
- Cloud forensics challenges (1)
- Cloud forensics solutions (1)
- Container Virtualization (1)
- Context-aware (1)
- Continuous authentication (1)
- Continuous monitoring (1)
- Cyber security (1)
- Digital Evidence (1)
- Digital forensics (1)
- Digital investigation (1)
- Docker (1)
- Federated identity (1)
- HPC (1)
- High Performance Computing (1)
- Hybrid Cloud (1)
- Neural net-works (1)
- Prediction (1)
- Privacy level agreement (PLA) (1)
- QoS (1)
- SLA (1)
- Service level agreement (SLA) (1)
- Single sign-on (1)
- Software agents (1)
- Storage (1)
- TAS (1)
- Transparency (1)
- Transparent authentication (1)
- User authentication (1)
- User survey (1)
- Users' perceptions (1)
- Users’ security practices (1)