@dblp

An applied methodology for information security and assurance: A study case for cloud computing.

, , and . ICITST, page 432-439. IEEE, (2014)

Links and resources

Tags