共 25 条
- [1] Abu-Libdeh H., Princehouse L., Weatherspoon H., RACS, Proceedings of the 1st ACM Symposium on Cloud computing – SoCC 10, (2010)
- [2] Almohri H.M.J., Watson L.T., Evans D., Predictability of IP address allocations for cloud computing platforms, IEEE Transactions on Information Forensics and Security, 15, pp. 500-511, (2020)
- [3] Alzain M.A., Soh B., Pardede E., A new model to ensure security in cloud computing services, J. Serv. Sci. Res, 4, pp. 49-70, (2012)
- [4] Bacis E., De Capitani di Vimercati S., Foresti S., Paraboschi S., Rosa M., Samarati P., Securing resources in decentralized cloud storage, IEEE Transactions on Information Forensics and Security, 15, pp. 286-298, (2020)
- [5] Bessani A., Correia M., Quaresma B., Andre F., Sousa P., DepSky, ACM Transactions on Storage, 9, 4, pp. 1-33, (2013)
- [6] Bowers K.D., Juels A., Oprea A., HAIL: a high-availability and integrity layer for cloud storage, Proceedings of the 16th ACM Conference on Computer and Communications Security – CCS 09, (2009)
- [7] Feldman A.J., Zeller W.P., Freedman M.J., Felten E.W., SPORC: group collaboration using untrusted cloud resources, OSDI, pp. 1-14, (2010)
- [8] Guedes T., Jesus L.A., Ocana K.A.C.S., Et al., Provenance-based fault tolerance technique recommendation for cloud-based scientific workflows: a practical approach, Cluster Comput, 23, pp. 123-148, (2020)
- [9] Hudson S., Sundar R.S.S., Koppu S., Fault control using triple modular redundancy (TMR), Advances in Intelligent Systems and Computing Progress in Computing, Analytics and Networking, pp. 471-480, (2018)
- [10] Kaur A., Gupta P., Singh M., Nayyar A., Data placement in era of cloud computing: a survey, taxonomy and open research issues, Scala Computing: Practice and Experience, 20, 2, pp. 377-398, (2019)