Computer Science
Security Model
100%
Cloud Computing
72%
Authentication
63%
Literature Review
54%
cloud provider
36%
Security Solution
27%
Data Security
27%
Cloud Service Provider
27%
Attackers
27%
Computing Resource
18%
Access Control Policy
18%
Data Model
18%
Security Requirements
18%
Ubiquitous Computing
18%
Authentication Technique
18%
Application Developer
18%
Security Mechanism
18%
Security Properties
18%
Simulation Tool
18%
Data Confidentiality
18%
Message Authentication Code
9%
Data Integrity
9%
Information Storage
9%
Evaluation Result
9%
Cloud Security
9%
Amazon Web Services
9%
Connected Device
9%
Computational Cost
9%
Performance Evaluation
9%
Data Access
9%
Service Management
9%
Filesystems
9%
Password
9%
Digital Content
9%
Service Interface
9%
Rapid Development
9%
Encrypted Data
9%
Information Processing
9%
Threat Model
9%
Computing Environment
9%
Communication Cost
9%
Malicious Behavior
9%
Cryptographic Operation
9%
System Operation
9%
Electronic Medical Record
9%
Expected Outcome
9%
Data Encryption Standard
9%
Scientific Paper
9%
Trust Management
9%
Wireless Sensor Network
9%
Security Analysis
9%
Unauthorized Access
9%
Security Attack
9%
Storage System
9%
Cloud Technology
9%
User Data
9%
Application Domain
9%
Potential Threat
9%
Security Problem
9%
Mobile Application
9%
Grid Computing
9%