共 26 条
- [1] Mell P., Grance T., The NIST Definition of Cloud Computing, (2009)
- [2] Aulbach S., Grust T., Jacobs D., Kemper A., Rittinger J., Multi-tenant databases for software as a service: schema-mapping techniques, SIGMOD '08 Proceedings of the 2008 ACM SIGMOD International Conference on Management of Data, pp. 1195-1206, (2008)
- [3] Krebs R., Momm C., Kounev S., Metrics and techniques for quantifying performance isolation in cloud environments, Elsevier Sci Comput Progr J (SciCo), 90, pp. 116-134, (2013)
- [4] Breslow A.D., Tiwari A., Schulz M., Carrington L., Tang L., Mars J., Enabling fair pricing on hpc systems with node sharing, Proceedings of the International Conference on High Performance Computing, Networking, Storage and Analysis, 37, pp. 1-12, (2013)
- [5] Gmach D., Rolia J., Cherkasova L., CCGRID '12: Proceedings of the 2012 12Th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (Ccgrid 2012), pp. 539-546, (2012)
- [6] Gens F., Mahowald R.P., Villars R.L., 2009, IDC Cloud Computing, (2010)
- [7] IDC Ranking of Issues of Cloud Computing Model., (2009)
- [8] Bates A., Mood B., Pletcher J., Pruse H., Valafar M., Butler K., On detecting co-resident cloud instances using network flow watermarking techniques, Int J Inf Secur, 13, 2, pp. 171-189, (2014)
- [9] Azar Y., Kamara S., Menache I., Raykova M., Shepard B., Colocation- resistant clouds, Proceedings of the 6Th Edition of the ACM Workshop on Cloud Computing Security, Ser. CCSW’14., pp. 9-20, (2014)
- [10] Koeune F., Standaert F.-X., Foundations of security analysis and design iii, A Tutorial on physical security and side-channel attacks, pp. 78-108, (2005)