共 22 条
[1]
Armbrust M(2010)A view of cloud computing Communications of the ACM 53 50-58
[2]
Fox A(2008)Wasp: Protecting web applications using positive tainting and syntax-aware evaluation IEEE Transactions on Software Engineering 34 65-81
[3]
Griffith R(2009)Data security in the world of cloud computing IEEE Security & Privacy, 7 61-64
[4]
Joseph AD(2012)A novel method for sql injection attack detection based on removing sql query attribute values Mathematical and Computer Modelling 55 58-68
[5]
Katz R(2009)Sdriver: Location-specific signatures prevent sql injection attacks Computers & Security 28 121-129
[6]
Konwinski A(2012)Addressing cloud computing security issues Future Generation Computer Systems 28 583-592
[7]
Lee G(undefined)undefined undefined undefined undefined-undefined
[8]
Patterson D(undefined)undefined undefined undefined undefined-undefined
[9]
Rabkin A(undefined)undefined undefined undefined undefined-undefined
[10]
Stoica I(undefined)undefined undefined undefined undefined-undefined