Contents
Academic literature on the topic 'Cloud security policies compliance'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cloud security policies compliance.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Dissertations / Theses on the topic "Cloud security policies compliance"
Doelitzscher, Frank. "Security audit compliance for cloud computing." Thesis, University of Plymouth, 2014. http://hdl.handle.net/10026.1/3005.
Full textUllah, Kazi Wali. "Automated Security Compliance Tool for the Cloud." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for telematikk, 2012. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-19104.
Full textFärjsjö, Felix, and Eric Stenberg. "Ensuring Continuous Security in the Cloud and Compliance with GDPR." Thesis, Uppsala universitet, Institutionen för informationsteknologi, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-328620.
Full textBrown, David A. "Examining the Behavioral Intention of Individuals' Compliance with Information Security Policies." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/3750.
Full textHanus, Bartlomiej T. "The Impact of Information Security Awareness on Compliance with Information Security Policies: a Phishing Perspective." Thesis, University of North Texas, 2014. https://digital.library.unt.edu/ark:/67531/metadc699974/.
Full textAlmusharraf, Ahlam. "DIVERGENCE IN STAKEHOLDER PERCEPTIONS OF SECURITY POLICIES: A REPGRID ANALYSIS FOR NORM-RULE COMPLIANCE." VCU Scholars Compass, 2016. http://scholarscompass.vcu.edu/etd/4346.
Full textLi, Yanhuang. "Interoperability and Negotiation of Security Policies." Thesis, Télécom Bretagne, 2016. http://www.theses.fr/2016TELB0414/document.
Full textMeng, Tianhui [Verfasser]. "Security and Performance Tradeoff Analysis of Offloading Policies in Mobile Cloud Computing / Tianhui Meng." Berlin : Freie Universität Berlin, 2017. http://d-nb.info/1136903623/34.
Full textBauer, Stefan, Edward Bernroider, and Katharina Chudzikowski. "Prevention is better than cure! Designing information security awareness programs to overcome users' non-compliance with information security policies in banks." Elsevier, 2017. http://dx.doi.org/10.1016/j.cose.2017.04.009.
Full textRODRIGUES, Thiago Gomes. "Cloudacc: a cloud-based accountability framework for federated cloud." Universidade Federal de Pernambuco, 2016. https://repositorio.ufpe.br/handle/123456789/18590.
Full text