共 23 条
[1]
Adair Robin J, 1966, TECHNICAL REPORT
[2]
Alhamad Mohammed, 2010, Proceedings of the 13th International Conference on Network-Based Information Systems (NBiS 2010), P321, DOI 10.1109/NBiS.2010.67
[3]
Almenarez F., 2004, First Workshop on Pervasive Security, Privacy and Trust PSPT, V4, P1
[4]
[Anonymous], 2011, International Workshop on Critical Information Infrastructures Security
[5]
Beloglazov A., 2013, Energy-efficient management of virtual machines in data centers for cloud computing
[7]
Energy-aware resource allocation heuristics for efficient management of data centers for Cloud computing
[J].
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE,
2012, 28 (05)
:755-768
[9]
Insider Threats to Cloud Computing: Directions for New Research Challenges
[J].
2012 IEEE 36TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC),
2012,
:387-394
[10]
Dawoud W., 2010, 2010 7 INT C INF SYS, P1