暂无分享,去创建一个
Norah Abokhodair | Hazel Taylor | Jitsuko Hasegawa | Surry Jones Mowery | Norah Abokhodair | Hazel Taylor | Jitsuko Hasegawa
[1] Randy H. Katz,et al. Above the Clouds: A Berkeley View of Cloud Computing , 2009 .
[2] Michael S. Bernstein,et al. Heads in the cloud , 2010, XRDS.
[3] Frank Gens,et al. Cloud Computing Benefits, risks and recommendations for information security , 2010 .
[4] Timothy Grance,et al. Guidelines on Security and Privacy in Public Cloud Computing | NIST , 2012 .
[5] Dimitrios Zissis,et al. Addressing cloud computing security issues , 2012, Future Gener. Comput. Syst..
[6] Gary B. Wills,et al. Towards security goals in summative e-assessment security , 2009, 2009 International Conference for Internet Technology and Secured Transactions, (ICITST).
[7] Rajkumar Buyya,et al. Cloud Computing Principles and Paradigms , 2011 .
[8] P. Mell,et al. The NIST Definition of Cloud Computing , 2011 .
[9] Noriaki Izumi,et al. Cloudsourcing: Managing Cloud Adoption , 2011 .
[10] Enuma Orakwue. Private Clouds: Secure Managed Services , 2010, Inf. Secur. J. A Glob. Perspect..
[11] John M. Acken,et al. A Cross Section of the Issues and Research Activities Related to Both Information Security and Cloud Computing , 2011 .
[12] Indrit Troshani,et al. Cloud Nine? An Integrative Risk Management Framework for Cloud Computing , 2011, Bled eConference.