A Behl, K Behl - 2012 world congress on information and …, 2012 - ieeexplore.ieee.org
… is at risk of being nonY available when needed most In this paper we analyze security issues
… The objective is to identify the various attack vectors and security issues pertinent to cloud …