Information Technology Reference
In-Depth Information
15. Morley, M., Lawrence, B.: The cloud: Changing the business ecosystem,
http://msdn.microsoft.com/en-us/library/cc836391.aspx
(accessed August 28, 2013)
16. Mcafee cloud identity manager, http://www.mcafee.com/ca/resources/
data-sheets/ds-cloud-identity-manager.pdf (accessed
August
28,
2013)
17. Jansen, W.: Directions in security metrics research. DIANE Publishing (2010)
18. Cremers, C.J.F.: The scyther tool: Verification, falsification, and analysis of security
protocols. In: Gupta, A., Malik, S. (eds.) CAV 2008. LNCS, vol. 5123, pp. 414-418.
Springer, Heidelberg (2008)
Search WWH ::




Custom Search