J Singh - International Journal of Electronics and Information …, 2014 - ijeie.jalaxy.com.tw
Cloud computing has emerged from the legacy system; consequently, threats applicable in
legacy system are equally applicable to cloud computing. In addition, cloud specific new …