共 42 条
[1]
Feng D., Zhang M., Zhang Y., Xu Z., Cloud Computing Security Research, Chinese Journal of Software, 22, 1, pp. 71-83, (2011)
[2]
Above the Clouds: A Berkeley View of Cloud Computing
[3]
Yao J., The Future Needs Cloud Computing, Development and Application of High Performance Computing, 26, 1, pp. 7-9, (2009)
[4]
Sumter L., Cloud Computing: Security Risk, Proceedings of ACM Southeast Conference, pp. 1-4, (2010)
[5]
Wang W., Li Z., Owens R., Bhargava B., Secure and Efficient Access to Outsourced Data, Proceedings of ACM Cloud Computing Security Workshop, pp. 55-65, (2009)
[6]
Zeng W., Zhao Y., Ou K., Song W., Research on Cloud Storage Architecture and Key Technologies, Proceedings of ACM International Conference on Information System, pp. 1044-1048, (2009)
[7]
Takabi H., James B.D., Gail-Joon A., Security and Privacy Challenges in Cloud Computing Environments, IEEE Security & Privacy, 10, 6, pp. 24-31, (2010)
[8]
Pearson S., Benameur A., Privacy, Security and Trust Issues Arising from Cloud Computing, Proceedings of IEEE International Conference on Cloud Computing Technology and Science, pp. 693-702, (2010)
[9]
Liu Q., Weng C., Li M., Luo Y., An In-VM Measuring Framework for Increasing Virtual Machine Security in Clouds, IEEE Security & Privacy, 10, 6, pp. 56-62, (2010)
[10]
IBM Research