共 16 条
[1]
Banirostam H., 2013, TRUST BASED APPROACH
[2]
Bhadauria Rohit., 2012, INT J COMPUTER APPL, V47, P47, DOI DOI 10.5120/7292-0578
[3]
Columbus L, 2014, 2014 CLOUD SURVEY RE
[4]
Elias H.D., 2011, EMC
[5]
Cloud Computing Security by Integrating Classical Encryption
[J].
MEDICAL AND REHABILITATION ROBOTICS AND INSTRUMENTATION (MRRI2013),
2014, 42
:320-326
[7]
Trust mechanisms for cloud computing
[J].
JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS,
2013, 2
[8]
Hussain M., 2011, SECAAS SECURITY SERV, DOI DOI 10.1145/2107556.2107564
[9]
Marinos A., 2009, LECT NOTES COMPUTER, V5931
[10]
Peng Y., 2012, J CHINA U POSTS TELE, V19, P182, DOI [10.1016/s10058885(11)60424x, DOI 10.1016/S1005-8885(11)60424-X]