共 15 条
[1]
[Anonymous], 2011, SEC GUID CRIT AR FOC
[2]
Information Flow Control for Secure Cloud Computing
[J].
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT,
2014, 11 (01)
:76-89
[3]
Crowcroft J, 2011, LECT NOTES COMPUT SC, V6522, P29, DOI 10.1007/978-3-642-17679-1_3
[4]
Dwork C, 2006, LECT NOTES COMPUT SC, V4052, P1
[5]
Hon K., 2014, POLICY LEGAL REGULAT
[6]
Trustworthy Geographically Fenced Hybrid Clouds
[J].
ACM/IFIP/USENIX MIDDLEWARE 2014,
2014,
:37-48
[7]
Lauter K, 2011, PROCEEDINGS OF THE 3RD ACM WORKSHOP CLOUD COMPUTING SECURITY WORKSHOP (CCSW'11), P113
[8]
Millard C., 2013, Cloud Computing Law
[9]
Myers A. C., 1997, Operating Systems Review, V31, P129, DOI 10.1145/269005.266669
[10]
Pasquier T., 2015, ARXIV150604391