共 15 条
[1]
[Anonymous], 2007, ACM SIGOPS OPERATING, DOI DOI 10.1145/1323293.1294294
[2]
Chen J., 2011, DESIGN IMPLEMENTATIO
[3]
[程芳权 Cheng Fangquan], 2013, [计算机研究与发展, Journal of Computer Research and Development], V50, P1613
[4]
Dan Wang, 2010, Proceedings of the 2010 2nd International Conference on Networks Security, Wireless Communications and Trusted Computing (NSWCTC 2010), P81, DOI 10.1109/NSWCTC.2010.27
[5]
Fox A., 2009, Above the Clouds: A Berkeley view of Cloud computing, V28, P13
[7]
Heiser J., 2008, ASSESSING SECURITY R
[8]
Kühn U, 2005, LECT NOTES COMPUT SC, V3659, P324
[9]
Pearson S, 2009, LECT NOTES COMPUT SC, V5931, P90, DOI 10.1007/978-3-642-10665-1_9