Different facets of security in the cloud
暂无分享,去创建一个
[1] Peter J. Denning,et al. Data Security , 1979, CSUR.
[2] Zhidong Shen,et al. The security of cloud computing system enabled by trusted computing technology , 2010, 2010 2nd International Conference on Signal Processing Systems.
[3] Cong Wang,et al. Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.
[4] Saira Begum,et al. Potential of cloud computing architecture , 2011, 2011 International Conference on Information and Communication Technologies.
[5] Balachandra Reddy Kandukuri,et al. Cloud Security Issues , 2009, 2009 IEEE International Conference on Services Computing.
[6] Jiann-Min Yang,et al. Analysis on Cloud-Based Security Vulnerability Assessment , 2010, 2010 IEEE 7th International Conference on E-Business Engineering.
[7] M. Roberts Masillamani,et al. Design and auditing of Cloud computing security , 2010, 2010 Fifth International Conference on Information and Automation for Sustainability.
[8] Paula Kotzé,et al. Secure cloud computing: Benefits, risks and controls , 2011, 2011 Information Security for South Africa.
[9] Eystein Mathisen,et al. Security challenges and solutions in cloud computing , 2011, 5th IEEE International Conference on Digital Ecosystems and Technologies (IEEE DEST 2011).
[10] Gary Mcgraw. Software security , 2004, IEEE Security & Privacy Magazine.
[11] Yin Hu,et al. Analysis and Research about Cloud Computing Security Protect Policy , 2011, 2011 International Conference on Intelligence Science and Information Engineering.
[12] Lori M. Kaufman,et al. Data Security in the World of Cloud Computing , 2009, IEEE Security & Privacy.