An Advanced Dynamic Authentic Security Method for Cloud Computing
暂无分享,去创建一个
[1] Hong Zhao,et al. Data Security and Privacy Protection Issues in Cloud Computing , 2012, 2012 International Conference on Computer Science and Electronics Engineering.
[2] A. Behl,et al. An analysis of cloud computing security issues , 2012, 2012 World Congress on Information and Communication Technologies.
[3] Guoman Lin. Research on electronic data security strategy based on cloud computing , 2012, 2012 2nd International Conference on Consumer Electronics, Communications and Networks (CECNet).
[4] Paula Kotzé,et al. Secure cloud computing: Benefits, risks and controls , 2011, 2011 Information Security for South Africa.
[5] Minglu Li,et al. Toward Secure Multikeyword Top-k Retrieval over Encrypted Cloud Data , 2013, IEEE Transactions on Dependable and Secure Computing.
[6] Simson L. Garfinkel,et al. An Evaluation of Amazon's Grid Computing Services: EC2, S3, and SQS , 2007 .
[7] Stephen Taylor,et al. A survey on securing the virtual cloud , 2013, Journal of Cloud Computing: Advances, Systems and Applications.
[8] Idit Keidar,et al. Trusting the cloud , 2009, SIGA.
[9] Kanika Lakhani,et al. Implementing digital signature with RSA encryption algorithm to enhance the Data Security of cloud in Cloud Computing , 2010, 2010 First International Conference On Parallel, Distributed and Grid Computing (PDGC 2010).
[10] Wei Xie,et al. Security and Privacy in Cloud Computing: A Survey , 2010, 2010 Sixth International Conference on Semantics, Knowledge and Grids.
[11] Bernd Grobauer,et al. Understanding Cloud Computing Vulnerabilities , 2011, IEEE Security & Privacy.
[12] Levent Ertaul,et al. Security Challenges in Cloud Computing , 2010, Security and Management.