共 16 条
[1]
Al Zain M.A., Pardede E., Soh B., Thom J.A., Cloud computing security: from single to multi-clouds, 2012 45th Hawaii International Conference on System Sciences, HICSS, pp. 5490-5499, (2012)
[2]
An efficient utilization of spectrum in wireless mobility by retransmission mechanism, Journal of Scientific & Industrial Research (JSIR), (2015)
[3]
Security in the Cloud, (2008)
[4]
Cusumano M., Cloud computing and SaaS as new computing platforms, Communications of the ACM, 53, 4, pp. 27-29, (2010)
[5]
Hay B., Nance K., Bishop M., Storm clouds rising: security challenges for IaaS cloud computing, 2011 44th Hawaii International Conference on System Sciences (HICSS), pp. 1-7, (2011)
[6]
Jayanthiladevi A., Kadharnawaz G.M., An efficient utilization of spectrum in seamless mobility by using retransmission rerouting mechanism in mobile IP, (2015)
[7]
Kandukuri B.R., Rakshit A., Cloud security issues, IEEE International Conference on Services Computing, 2009. SCC’09, pp. 517-520, (2009)
[8]
Kavis M.J., Architecting the Cloud: Design Decisions for Cloud Computing Service Models (SaaS, PaaS, and IaaS), (2014)
[9]
Lalitha T., Devi A.J., Security in wireless sensor networks: key management module in EECBKM, 2014 World Congress on Computing and Communication Technologies, pp. 306-308, (2014)
[10]
Li J., Li Y.K., Chen X., Lee P.P., Lou W., A hybrid cloud approach for securely authorized deduplication, IEEE Transactions on Parallel and Distributed Systems, 26, 5, pp. 1206-1216, (2015)