Lisa Nelander edited 2_4_1_Security_and__.html  almost 8 years ago

Commit id: 7da64266aad9081fc3dda6d4d7c7dfb797d13180

deletions | additions      

       

& Ransome, 2009). The trust in the cloud has to be established through making  sure that the data is stored securely and an access management is implemented  so only entitled users are able to access it. This depends on the enforcement  of security policies by the provider, e.g. access control and data encryption.