Cloud computing security
    flowchart
    AA["Associated Authors (0)"]
    C[Cloud computing security]
    BC["Broader Concepts (1)"]
    NC["Narrower Concepts (8)"]
    C== skos:broader ==>BC
    NC== skos:broader ==>C
    AA== dcterms:relation ==>C
    click BC "#broader-concepts"
    click NC "#narrower-concepts"
    click AA "#associated-authors"
    NI["add incoming edge"]
    NO["add outgoing edge"]
    NI-- ? -->C
    C-- ? -->NO
    click NI "#add-incoming-edge"
    click NO "#add-outgoing-edge"
    style NI stroke-width:2px,stroke-dasharray: 5 5
    style NO stroke-width:2px,stroke-dasharray: 5 5
- Wikidata
- https://www.wikidata.org/wiki/Q370563
- OpenAlex ID
- https://openalex.org/C184842701 (API record)
- OpenAlex Description
- broad set of policies, technologies, applications, and controls utilized to protect virtualized IP, data, applications, services, and the associated infrastructure of cloud computing
- OpenAlex Level [?]
- 3
Broader Concepts
Narrower Concepts
- Cloud service provider
- Cloud testing
- Network Access Control
- Network security policy
- Security information and event management
- Software security assurance
- Trusted computing base
- Utility computing
Associated Authors
Add Incoming Edge
Login via ORCiD to contribute.
Add Outgoing Edge
Login via ORCiD to contribute.
 HelioWeb
 HelioWeb