共 31 条
[1]
[Anonymous], INSIDER THREATS CLOU
[2]
Binu M. S., 2012, INDIAN J COMPUTER SC, V3, P548
[4]
Chang-Lung Tsai, 2010, Proceedings of the 2010 Sixth International Conference on Networked Computing and Advanced Information Management (NCM 2010), P645
[6]
Choudhury AJ., 2011, IEEE Asia-Pacific Services Computing Conference, P110, DOI DOI 10.1109/APSCC.2011.14
[7]
Day D. J., 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), P931, DOI 10.1109/TrustCom.2012.110
[9]
Gautam Ajeet Kumar, 2012, INT J COMPUTER APPL, V53, P1
[10]
Gehrke J, 1999, SIGMOD RECORD, VOL 28, NO 2 - JUNE 1999, P169, DOI 10.1145/304181.304197