共 111 条
[1]
Armbrust M., Fox A., Griffith R., Et al., A view of cloud computing, Commun ACM, 53, 4, pp. 50-58, (2010)
[2]
Hayes B., Cloud computing, Commun ACM, 51, 7, pp. 9-11, (2008)
[3]
Feng D.G., Zhang M., Zhang Y., Xu Z., Study on cloud computing security, Journal of Software, 22, 1, pp. 71-83, (2011)
[4]
Popa L., Yu M., Et al., Cloud police: Taking access control out of the network, Hotnets'10. ACM 2010, pp. 1-6, (2010)
[5]
Hao F., Lakshman T.V., Mukherjee S., Song H.Y., Secure cloud computing with a virtualized network infrastructure, The 2nd USENIX Conference on Hot Topics in Cloud Computing, pp. 1-7, (2010)
[6]
Oberheide J., Cooke E., Jahanian F., Cloudav: N-version antivirus in the network cloud, Proceedings of the 17th Conference on Security Symposium, pp. 91-106, (2008)
[7]
Oberheide J., Veeraraghavan K., Cooke E., Flinn J., Jahanian F., Virtualized in-cloud security services for mobiledevices, Proceedings of the First Workshop on Virtualization in Mobile Computing, pp. 31-35, (2008)
[8]
Chow R., Jakobsson M., Masuoka R., Jlina, Niu Y., Shi E., Song Z., Authentication in the clouds: A framework and its application to mobile users, Proceedings of the 2010 ACM Workshop on Cloud computing Security Workshop, pp. 1-6, (2010)
[9]
Portokalidis G., Homburg P., Anagnostakis K., Bos Paranoid H., Android: Versatile protection for smartphones, In Proceedings of the 26th Annual Computer Security Applications Conference, pp. 347-356, (2010)
[10]
Wu J.-Y., Fu J.-Q., Ping L.-D., Xie Q., Study on the P2P cloud storage system, Acta Electronica Sinica, 38, 5, pp. 1100-1107, (2011)