共 30 条
[1]
Aldossary S., 2016, INT J ADV COMPUTER S, V7
[2]
[Anonymous], CUST CLOUD ARCH MOB
[3]
[Anonymous], 2010, OWASP top 10 application security risks -
[4]
Ateniese G, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P598
[6]
Atieniese G., 2008, P 4 INT C SEC PRIV C
[7]
Enhanced Security Framework for Data Integrity Using Third-party Auditing in the Cloud System
[J].
ARTIFICIAL INTELLIGENCE AND EVOLUTIONARY ALGORITHMS IN ENGINEERING SYSTEMS, VOL 2,
2015, 325
:25-31
[8]
Bhadauria Rohit., 2012, INT J COMPUTER APPL, V47, P47, DOI DOI 10.5120/7292-0578
[9]
Brunette G., 2009, Cloud Security Alliance, P1
[10]
Catteddu D., 2009, INFORM SECURITY, V51273, P1