Confidentialité et disponibilité des données entreposées dans les nuages
暂无分享,去创建一个
Jérôme Darmont | Nouria Harbi | Gérald Gavin | Kawthar Karkouda | N. Harbi | J. Darmont | Kawthar Karkouda | Gérald Gavin
[1] Adi Shamir,et al. How to share a secret , 1979, CACM.
[2] Meikang Qiu,et al. A Review on Cloud Computing: Design Challenges in Architecture and Security , 2011, J. Comput. Inf. Technol..
[3] Mladen A. Vouk,et al. Cloud Computing – Issues, Research and Implementations , 2008, CIT 2008.
[4] Kevin Curran,et al. Cloud Computing Security , 2011, Int. J. Ambient Comput. Intell..
[5] Cong Wang,et al. Ensuring data storage security in Cloud Computing , 2009, 2009 17th International Workshop on Quality of Service.
[6] Subhash C. Kak,et al. Online data storage using implicit security , 2009, Inf. Sci..
[7] Jörg Schwenk,et al. On Technical Security Issues in Cloud Computing , 2009, 2009 IEEE International Conference on Cloud Computing.
[8] Danwei Chen,et al. A Study on Secure Data Storage Strategy in Cloud Computing , 2010, J. Convergence Inf. Technol..
[9] Peng Ning,et al. Managing security of virtual machine images in a cloud environment , 2009, CCSW '09.
[10] Peter Desnoyers,et al. Scheduler Vulnerabilities and Attacks in Cloud Computing , 2011, ArXiv.