共 10 条
[1]
Hu Yan, 2013, CLOUD COMPUTING DATA, V2, P212
[2]
A strengthening plan for enterprise information security based on cloud computing
[J].
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS,
2014, 17 (03)
:703-710
[3]
Manjusha R., 2014, 2014 International Conference on Embedded Systems (ICES), P116, DOI 10.1109/EmbeddedSys.2014.6953101
[7]
WU Xudong, 2011, NETINFO SECURITY, V9, P18
[8]
Xiong Lizhi, NCURRENCY COMPUTAT, V20, P105
[9]
Xu Lwi, 2012, VALUE ENG, V9, P20
[10]
ZHANG Wenke, 2012, INFORM SECURITY COMM, V11, P38