共 25 条
[1]
Rastogi G., Sushil R., Cloud computing implementation: Key issues and solutions, In 2015 International Conference on Computing for Sustainable Global Development, Indiacom, (2015)
[2]
Lee J., A view of cloud computing, Int J Networked Distrib Comput, 1, 1, pp. 2-8, (2013)
[3]
Khalil I.M., Khreishah A., Azeem M., Cloud computing security: a survey, Computers, 3, 1, pp. 1-35, (2014)
[4]
Grobauer B., Walloschek T., Stocker E., Understanding cloud computing vulnerabilities, IEEE Secur Priv, 9, 2, pp. 50-57, (2011)
[5]
Singh A., Security concerns and vulnerabilities in cloud computing: a qualitative analysis, Int J Inf Technol, 11, 4, pp. 683-690, (2019)
[6]
Neumann P.G., Security and privacy, Computer Science Handbook, pp. 77-81, (2004)
[7]
Ardagna C.A., Asal R., Damiani E., Vu Q.H., From security to assurance in the cloud: a survey, ACM Comput Surv, 48, (2015)
[8]
Kumar R., Goyal R., On cloud security requirements, threats, vulnerabilities and countermeasures: a survey, Comput Sci Rev, 33, pp. 1-48, (2019)
[9]
Phaphoom N., Wang X., Samuel S., Helmer S., Abrahamsson P., A survey study on major technical barriers affecting the decision to adopt cloud services, J Syst Softw, 103, pp. 167-181, (2015)
[10]
Hsu C.L., Lin J.C.C., Factors affecting the adoption of cloud services in enterprises, Inf Syst E-bus Manag, 14, 4, pp. 791-822, (2016)