dc.contributor.author |
Kouatli, Issam |
|
dc.contributor.editor |
Endicott-Popovsky, Barbara |
en_US |
dc.date.accessioned |
2017-11-15T12:34:54Z |
|
dc.date.available |
2017-11-15T12:34:54Z |
|
dc.date.copyright |
2014 |
en_US |
dc.date.issued |
2017-11-15 |
|
dc.identifier.isbn |
9.78191E+12 |
en_US |
dc.identifier.uri |
http://hdl.handle.net/10725/6617 |
en_US |
dc.language.iso |
en |
en_US |
dc.publisher |
Academic Conferences and Publishing International Limited |
en_US |
dc.subject |
Cloud computing -- Congresses |
en_US |
dc.subject |
Computer security -- Congresses |
en_US |
dc.title |
The ten commandments of cloud computing security management |
en_US |
dc.type |
Conference Paper / Proceeding |
en_US |
dc.author.school |
SOB |
en_US |
dc.author.idnumber |
200301034 |
en_US |
dc.author.department |
Department of Information Technology and Operations Management (ITOM) |
en_US |
dc.description.embargo |
N/A |
en_US |
dc.publication.place |
Reading, U.K. |
en_US |
dc.keywords |
Cloud ethics |
en_US |
dc.keywords |
BYOD mobility |
en_US |
dc.keywords |
Data protection |
en_US |
dc.keywords |
Cloud security management |
en_US |
dc.keywords |
Cloud governance |
en_US |
dc.description.bibliographiccitations |
Includes bibliographical references. |
en_US |
dc.identifier.ctation |
Kouatli, I. (2014, October). The ten commandments of cloud computing security management. In International Conference on Cloud Security Management (ICCSM) (pp. 73-81). |
en_US |
dc.author.email |
issam.kouatli@lau.edu.lb |
en_US |
dc.conference.date |
23-24 October 2014 |
en_US |
dc.conference.pages |
73-81 |
en_US |
dc.conference.place |
The Cedars, University of Reading, Reading, UK |
en_US |
dc.conference.title |
Proceedings of the International Conference on Cloud Security Management ICCSM-2014 |
en_US |
dc.identifier.tou |
http://libraries.lau.edu.lb/research/laur/terms-of-use/articles.php |
en_US |
dc.identifier.url |
https://books.google.com.lb/books?hl=en&lr=&id=1lDtBAAAQBAJ&oi=fnd&pg=PA73&dq=The+ten+commandments+of+cloud+computing+security+management&ots=W5AueO5AYl&sig=aDWeEkgJT3iBdSbe-TdLrK4M0ao&redir_esc=y#v=onepage&q=The%20ten%20commandments%20of%20cloud%20computing%20security%20management&f=false |
en_US |
dc.publication.date |
2014 |
en_US |
dc.author.affiliation |
Lebanese American University |
en_US |