共 12 条
[1]
Luis V., Luis R., Daniel M., Locking the sky: A survey on IaaS cloud security, Computing, 91, 1, pp. 93-118, (2011)
[2]
Daniel D., Rich W., Chris G., Et al., The eucalyptus opensource cloud-computing system, Proceedings of the 2009 9th IEEE/ACM International Symposium on Cluster Computing and the Grid, pp. 124-131, (2009)
[3]
Nuno S., Krishna G., Rodrigo R., Towards trusted cloud computing, Proceeding of the 2009 Conference on Hot Topics in Cloud Computing, pp. 22-27, (2009)
[4]
Khan I., Rehman H., Anwar Z., Design and deployment of a trusted eucalyptus cloud, 2011 IEEE International Conference on Cloud Computing (CLOUD), pp. 380-387, (2011)
[5]
11889-1-2009 Information technology-trusted platform module - Part 2: Design principles, (2009)
[6]
Berthonlon B., Varrette S., Bouvry P., Certicloud: A novel TPM-based approach to ensure cloud IaaS security, 2011 IEEE International Conference on Cloud Computing (CLOUD), pp. 121-130, (2011)
[7]
Dhinesh B., Venkata K., Mohammed Z., Et al., An analysis of security related issues in cloud computing, Communications in Computer and Information Science, 168, 2, pp. 180-190, (2011)
[8]
Anupam D., Ante D., John M., Et al., Protocol Composition Logic (PCL), Electronic Notes in Theoretical Computer Science, 172, pp. 311-358, (2007)
[9]
Canetti R., Universally composable security: A new paradigm for cryptographic protocols, Proceeding of Foundations of Computer Science, pp. 136-145, (2001)
[10]
Chaki S., Datta A., ASPIER: An automated framework for verifying security protocol implementations, Computer Security Foundations Symposium, pp. 172-185, (2009)