Computer Science
Anonymization
33%
Authentication
66%
Authentication Procedure
7%
Cloud Computing
15%
Cloud Environment
66%
Cloud Infrastructure
8%
Cloud Platform
7%
Cloud Security
66%
Cloud Service Consumer
33%
Cloud Service Provider
100%
cloud system
33%
Collected Data
8%
Confidential Data
33%
Data Exfiltration
33%
Data Isolation
33%
Data Leak Prevention
33%
Data Security
16%
Defense in Depth
33%
Digital Forensics
66%
Digital Object
7%
Dynamic Information
66%
Encryption Method
7%
Encryption System
14%
Encryption Technique
7%
Execution Resource
33%
Forensics Investigation
7%
Homomorphic Encryption
7%
Information Flow Control
66%
Information Storage
16%
Input/Output
66%
Internet-Of-Things
66%
Key Generation
66%
Malicious Activity
66%
Mechanism Design
33%
Memory Consumption
33%
Monitoring Data
16%
Policy Framework
33%
Security and Privacy
8%
Security Policy
16%
Service Management
33%
Tracking Data
16%
Use Case
33%
Social Sciences
Data Envelopment Analysis
33%
Early 20th Century
6%
Finance
6%
Human Resources
6%
Marketing Management
6%
Marketing Strategy
6%
Mathematical Model
6%
Operations Management
6%
Organizational Effectiveness
6%
Research and Development
6%
Research Focus
6%
Stochastics
33%