共 23 条
[1]
Chu H., 2014, J ELECT SCI TECH, V12
[2]
오영석, 2015, Architectural Research, V17, P83, DOI 10.5659/AIKAR.2015.17.3.83
[4]
Fulco M., 2015, POISED TAKEOFF CHINA
[5]
Gai K., 2013, Proceedings of the Conference for Information Systems Applied Research ISSN, V2167, P1508
[6]
Gai K., 2014, Journal of Information System Applied Research, V7, P28
[8]
Proactive Attribute-based Secure Data Schema for Mobile Cloud in Financial Industry
[J].
2015 IEEE 17TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, 2015 IEEE 7TH INTERNATIONAL SYMPOSIUM ON CYBERSPACE SAFETY AND SECURITY, AND 2015 IEEE 12TH INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS (ICESS),
2015,
:1332-1337
[9]
Electronic Health Record Error Prevention Approach Using Ontology in Big Data
[J].
2015 IEEE 17TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, 2015 IEEE 7TH INTERNATIONAL SYMPOSIUM ON CYBERSPACE SAFETY AND SECURITY, AND 2015 IEEE 12TH INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS (ICESS),
2015,
:752-757
[10]
Towards Cloud Computing: A Literature Review on Cloud Computing and its Development Trends
[J].
2012 FOURTH INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY (MINES 2012),
2012,
:142-146