Business and Government Organizations' Adoption of Cloud Computing
暂无分享,去创建一个
[1] Ronald L. Krutz,et al. Cloud Security: A Comprehensive Guide to Secure Cloud Computing , 2010 .
[2] Antonio Pescapè,et al. Cloud monitoring: A survey , 2013, Comput. Networks.
[3] J. R. Vic Winkler. Securing the Cloud: Cloud Computer Security Techniques and Tactics , 2011 .
[4] K. Barriball,et al. Collecting data using a semi-structured interview: a discussion paper. , 1994, Journal of advanced nursing.
[5] V. Kavitha,et al. A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..
[6] Bernd Grobauer,et al. Understanding Cloud Computing Vulnerabilities , 2011, IEEE Security & Privacy.
[7] Daniel Muijs,et al. Doing Quantitative Research in Education with SPSS , 2004 .
[8] Jugal K. Kalita,et al. Network attacks: Taxonomy, tools and systems , 2014, J. Netw. Comput. Appl..
[9] Dorothy Marinucci,et al. Advances in Cyber Security , 2013 .
[10] Dimitrios Zissis,et al. Addressing cloud computing security issues , 2012, Future Gener. Comput. Syst..
[11] Sungyoung Lee,et al. Adoption issues for cloud computing , 2009, iiWAS.
[12] Bofeng Zhang,et al. Comparison of Several Cloud Computing Platforms , 2009, 2009 Second International Symposium on Information Science and Engineering.
[13] R. Gorden,et al. Interviewing: Strategy, techniques, and tactics , 1987 .
[14] Vic Winkler. Securing the Cloud: Data Security , 2011 .
[15] Raouf Boutaba,et al. Cloud computing: state-of-the-art and research challenges , 2010, Journal of Internet Services and Applications.
[16] P. Burnard. A method of analysing interview transcripts in qualitative research. , 1991, Nurse education today.
[17] P. Mell,et al. The NIST Definition of Cloud Computing , 2011 .
[18] Philip E. T. Lewis,et al. Research Methods for Business Students , 2006 .
[19] Philip E. T. Lewis,et al. Research Methods for Business Students (5th edn) , 2007 .
[20] D. Ogrizovic,et al. Open source science clouds , 2010, The 33rd International Convention MIPRO.
[21] J. Creswell. Qualitative inquiry and research design: Choosing among five approaches, 2nd ed. , 2007 .
[22] Douglas Thain,et al. A Comparison and Critique of Eucalyptus, OpenNebula and Nimbus , 2010, 2010 IEEE Second International Conference on Cloud Computing Technology and Science.
[23] Ian Lumb,et al. A Taxonomy and Survey of Cloud Computing Systems , 2009, 2009 Fifth International Joint Conference on INC, IMS and IDC.
[24] John Krogstie. Model-Based Development and Evolution of Information Systems: A Quality Approach , 2012 .
[25] Gail-Joon Ahn,et al. Security and Privacy Challenges in Cloud Computing Environments , 2010, IEEE Security & Privacy.
[26] J. R. Freer. Computer Communications and Networks , 1988 .
[27] Tharam S. Dillon,et al. Cloud Computing: Issues and Challenges , 2010, 2010 24th IEEE International Conference on Advanced Information Networking and Applications.
[28] Randy H. Katz,et al. A view of cloud computing , 2010, CACM.
[29] Laurie Hirsch,et al. Guide to Cloud Computing: Principles and Practice , 2012 .
[30] Norman G. Finkelstein. How To Books , 2002 .
[31] Gary Anthes,et al. Security in the cloud , 2010, Commun. ACM.
[32] Arun Venkataramani,et al. Disaster Recovery as a Cloud Service: Economic Benefits & Deployment Challenges , 2010, HotCloud.
[33] Ari Juels,et al. New approaches to security and availability for cloud data , 2013, CACM.