Optimizing Security of Cloud Computing within the DoD
暂无分享,去创建一个
[1] Jong Sou Park,et al. Cloud computing: future solution for e-governance , 2009, ICEGOV '09.
[2] Idit Keidar,et al. Trusting the cloud , 2009, SIGA.
[3] Shon Harris,et al. All-in-one CISSP exam guide , 2005 .
[4] Khaled M. Khan,et al. Establishing Trust in Cloud Computing , 2010, IT Professional.
[5] Martin Pluss. Head in the Clouds: Cloud Computing , 2010 .
[6] Dustin Owens,et al. Securing elasticity in the cloud , 2010, Commun. ACM.
[7] Yung-Hsiang Lu,et al. Cloud Computing for Mobile Users: Can Offloading Computation Save Energy? , 2010, Computer.
[8] Jason S. Bolin. Use case analysis for adopting cloud computing in Army test and evaluation , 2010 .
[9] Lori M. Kaufman,et al. Data Security in the World of Cloud Computing , 2009, IEEE Security & Privacy.
[10] Paul T. Jaeger,et al. Identifying the security risks associated with governmental use of cloud computing , 2010, Gov. Inf. Q..
[11] Jennifer E. Sims,et al. Transforming U.S. intelligence , 2005 .
[12] Steven Hernandez Cissp. Official (ISC)2 Guide to the CISSP CBK , 2012 .