共 22 条
[1]
Almorsy M., Grundy J., Ibrahim A.S., Collaboration-based cloud computing security management framework, IEEE Int. Conference on Cloud Computing (CLOUD), (2011)
[2]
Arockiam L., Monikandan S., Data security and privacy in cloud storage using hybrid symmetric encryption algorithm, International Journal Advance Research in Computer and Communication Engineering, 2, 8, pp. 3064-3070, (2013)
[3]
Bacon J., Et al., Information flow control for secure cloud computing, IEEE Transaction on Network and Service Management, 11, 1, pp. 76-89, (2014)
[4]
Barsoum A., Hasan A., Enabling dynamic data and indirect mutual trust for cloud computing storage systems, IEEE Transactions on Parallel and Distributed Systems, 24, 12, pp. 2375-2385, (2013)
[5]
Top Threats to Cloud Computing V1. 0, (2010)
[6]
Isaac E.R.H.P., Isaac J.H.R., Visumathi J., Reverse circle cipher for personal and network security, 2013 International Conference on Information Communication and Embedded Systems (ICICES), (2013)
[7]
Kumar R.S., Saxena A., Data integrity proofs in cloud storage, Third International Conference on Communication Systems and Networks (COMSNETS), (2011)
[8]
Li J., Et al., Managing data retention policies at scale, IEEE Transactions on Network and Service Management, 9, 4, pp. 393-406, (2012)
[9]
Li X., Du J., Adaptive and attribute-based trust model for service level agreement guarantee in cloud computing, IET Inf. Secur., 7, 1, pp. 39-50, (2013)
[10]
Mell P., Grance T., The NIST Definition of Cloud Computing. Microsoft Azure, (2011)