共 96 条
[1]
Albeshri A., 2010, Proceedings of the 2010 IEEE 12th International Conference on High Performance Computing and Communications (HPCC 2010), P641, DOI 10.1109/HPCC.2010.87
[2]
ALrayes MM, 2011, IEEE INT CONF NETWOR, P71, DOI 10.1109/ICON.2011.6168509
[3]
An Entity-centric Approach for Privacy and Identity Management in Cloud Computing
[J].
2010 29TH IEEE INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS SRDS 2010,
2010,
:177-183
[4]
[Anonymous], 1989, OXFORD ENGLISH DICT, V2nd
[6]
Ates M., 2011, 2011 Sixth International Conference on Availability, Reliability and Security, P555, DOI 10.1109/ARES.2011.85
[7]
Determinating Timing Channels in Compute Clouds
[J].
PROCEEDINGS OF THE 2010 ACM WORKSHOP CLOUD COMPUTING SECURITY WORKSHOP (CCSW'10:),
2010,
:103-108
[8]
Balen DO, 2011, PROCEEDINGS OF THE TENTH INTERNATIONAL CONFERENCE ON NETWORKS (ICN 2011), P341
[9]
Behl A., 2011, Proceedings of the 2011 World Congress on Information and Communication Technologies (WICT), P217, DOI 10.1109/WICT.2011.6141247
[10]
Bhadauria R., 2013, SURVEY SECURITY ISSU