共 14 条
[1]
Buyya R., Srirama S.N., Casale G., Et al., A manifesto for future generation cloud computing, ACM Computing Surveys, 51, 5, pp. 1-38, (2019)
[2]
Singh A., Chatterjee K., Cloud security issues and challenges:A survey, Journal of Network and Computer Applications, 79, pp. 88-115, (2017)
[3]
Cloud controls matrix v3.0.1
[4]
Consensus assessments initiative questionnaire v3.0.1
[5]
FedRAMP policy memo
[6]
Information technology-cloud computing-service level agreement (SLA) framework part 1:Overview and concepts:19086-1, (2016)
[7]
Jiang Z., Zhao W., Liu Y., Et al., Model for cloud computing security assessment based on classified protection, Computer Science, 40, 8, pp. 151-156, (2013)
[8]
Yang A., Gao F., Bian M., Et al., Cloud computing security evaluation and countermeasure based on AHP-fuzzy comprehensive evaluation, Journal on Communications, 37, pp. 104-110, (2016)
[9]
Gao Z., Lai Y., Peng D., Interval-valued hesitant fuzzy grey compromise relation analysis method for security of cloud computing evaluation, Journal of Computer Applications, 37, 10, pp. 2847-2853, (2017)
[10]
Halabi T., Bellaiche M., Towards quantification and evaluation of security of cloud service providers, Journal of Information Security and Applications, 33, pp. 55-65, (2017)