共 31 条
[1]
Methodology to Obtain the Security Controls in Multi-cloud Applications
[J].
PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND SERVICES SCIENCE, VOL 1 (CLOSER),
2016,
:327-332
[2]
Andrienko G., EXTRACTING PATTERNS
[3]
[Anonymous], 2010, IEEE DATABASE ENG B
[4]
Asahara A, 2011, P 19 ACM SIGSPATIAL, P25, DOI DOI 10.1145/2093973.2093979
[6]
Activity recognition from user-annotated acceleration data
[J].
PERVASIVE COMPUTING, PROCEEDINGS,
2004, 3001
:1-17
[7]
Bray T., JAVASCRIPT OBJECT NO
[9]
Cloud Security: from Per-Provider to Per-Service Security SLAs
[J].
2016 8TH INTERNATIONAL CONFERENCE ON INTELLIGENT NETWORKING AND COLLABORATIVE SYSTEMS (INCOS),
2016,
:469-474
[10]
Gambs S., 2012, P 1 WORKSH MEAS PRIV, P1