Cloud computing featuring software for use cryptographic key management; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer services, namely, integration of private and public cloud computing environments
Computer and Scientific