共 98 条
[1]
Achbarou Omar, 2018, International Journal of Communication Networks and Information Security, V10, P526
[2]
Ahirao P, 2021, INT RES J INNOVATION, V5, P10
[3]
RSM analysis based cloud access security broker: a systematic literature review
[J].
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS,
2022, 25 (05)
:3733-3763
[7]
Towards a Holistic Multi-Cloud Brokerage System: Taxonomy, Survey and Future Directions
[J].
CIT/IUCC/DASC/PICOM 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY - UBIQUITOUS COMPUTING AND COMMUNICATIONS - DEPENDABLE, AUTONOMIC AND SECURE COMPUTING - PERVASIVE INTELLIGENCE AND COMPUTING,
2015,
:1468-1473
[10]
The Effects of Applying Privacy by Design to Preserve Privacy and Personal Data Protection in Mobile Cloud Computing: An Exploratory Study
[J].
SYMMETRY-BASEL,
2020, 12 (12)
:1-24