共 97 条
[1]
Abbadi I. M., 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), P127, DOI 10.1109/TrustCom.2012.107
[2]
Digital Trust - Trusted Computing and Beyond A Position Paper
[J].
2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM),
2014,
:884-892
[3]
Anbang R., 2011, P 6 ACM WORKSH SCAL, P3, DOI DOI 10.1145/2046582.2046586
[4]
Anderson Melvin J, 2007, Towards Trustworthy Virtualization Environments: Xen Library OS Security Service Infrastructure, P88
[5]
[Anonymous], 2010, CCSW 10
[6]
[Anonymous], P S CLOUD COMP
[9]
A novel intrusion severity analysis approach for Clouds
[J].
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF GRID COMPUTING AND ESCIENCE,
2013, 29 (01)
:416-428