Cloud computing security
flowchart
AA["Associated Authors (0)"]
C[Cloud computing security]
BC["Broader Concepts (1)"]
NC["Narrower Concepts (8)"]
C== skos:broader ==>BC
NC== skos:broader ==>C
AA== dcterms:relation ==>C
click BC "#broader-concepts"
click NC "#narrower-concepts"
click AA "#associated-authors"
NI["add incoming edge"]
NO["add outgoing edge"]
NI-- ? -->C
C-- ? -->NO
click NI "#add-incoming-edge"
click NO "#add-outgoing-edge"
style NI stroke-width:2px,stroke-dasharray: 5 5
style NO stroke-width:2px,stroke-dasharray: 5 5
- Wikidata
- https://www.wikidata.org/wiki/Q370563
- OpenAlex ID
- https://openalex.org/C184842701 (API record)
- OpenAlex Description
- broad set of policies, technologies, applications, and controls utilized to protect virtualized IP, data, applications, services, and the associated infrastructure of cloud computing
- OpenAlex Level [?]
- 3
Broader Concepts
Narrower Concepts
- Cloud service provider
- Cloud testing
- Network Access Control
- Network security policy
- Security information and event management
- Software security assurance
- Trusted computing base
- Utility computing
Associated Authors
Add Incoming Edge
Login via ORCiD to contribute.
Add Outgoing Edge
Login via ORCiD to contribute.
HelioWeb