Preserving Privacy through Data Control in a Cloud Computing Architecture Using Discretion Algorithm
暂无分享,去创建一个
[1] Carla Merkle Westphall,et al. Intrusion Detection for Grid and Cloud Computing , 2010, IT Professional.
[2] Carlos Becker Westphall,et al. Improvements in the model for interoperability of intrusion detection responses compatible with the IDWG model , 2007, Int. J. Netw. Manag..
[3] Yan Zhao,et al. Providing privacy preserving in Cloud computing , 2010, 3rd International Conference on Human System Interaction.
[4] Lizhe Wang,et al. Scientific Cloud Computing: Early Definition and Experience , 2008, 2008 10th IEEE International Conference on High Performance Computing and Communications.
[5] M. Tim Jones. Cloud Computing with Linux , 2012 .
[6] C.B. Westphall,et al. Grid-M: Middleware to Integrate Mobile Devices, Sensors and Grid Computing , 2007, 2007 Third International Conference on Wireless and Mobile Communications (ICWMC'07).
[7] Ian T. Foster,et al. A security architecture for computational grids , 1998, CCS '98.
[8] Marc Dacier,et al. Towards a taxonomy of intrusion-detection systems , 1999, Comput. Networks.
[9] N.B. Idris,et al. Artificial Intelligence Techniques Applied to Intrusion Detection , 2005, 2005 Annual IEEE India Conference - Indicon.