The Influence of the Use of Mobile Devices and the Cloud Computing in Organizations
暂无分享,去创建一个
[1] Gail-Joon Ahn,et al. Security and Privacy Challenges in Cloud Computing Environments , 2010, IEEE Security & Privacy.
[2] Mike Potts. The state of information security , 2012, Netw. Secur..
[3] Hormazd Romer,et al. Best practices for BYOD security , 2014 .
[4] Gordon Thomson. BYOD: enabling the chaos , 2012, Netw. Secur..
[5] Jennifer E. Moyer. Managing Mobile Devices in Hospitals: A Literature Review of BYOD Policies and Usage , 2013 .
[6] P. Mell,et al. SP 800-145. The NIST Definition of Cloud Computing , 2011 .
[7] P. Vinoth Kumar,et al. Study on Cloud Computing and Security Approaches , 2013 .
[8] Steve Mansfield-Devine,et al. Interview: BYOD and the enterprise network , 2012 .
[9] P. Mell,et al. The NIST Definition of Cloud Computing , 2011 .
[10] Seyed A Shahrestani,et al. Cloud Computing: Security and Reliability Issues , 2013 .
[11] Luis Rodero-Merino,et al. A break in the clouds: towards a cloud definition , 2008, CCRV.
[12] Yanpei Chen,et al. What's New About Cloud Computing Security? , 2010 .
[13] Miss. Trupti S. Lokhande,et al. A Review Paper on Cloud Computing Security , 2013 .
[14] D. Luxton,et al. mHealth data security: the need for HIPAA-compliant standardization. , 2012, Telemedicine journal and e-health : the official journal of the American Telemedicine Association.
[15] Ramiro Gonçalves,et al. Cloud Computing Decisions in Real Enterprises , 2014 .
[16] Chris Rose,et al. A Break in the Clouds: Towards a Cloud Definition , 2011 .
[17] Antonio Scarfò,et al. New Security Perspectives around BYOD , 2012, 2012 Seventh International Conference on Broadband, Wireless Computing, Communication and Applications.
[18] Neal Leavitt. Today's Mobile Security Requires a New Approach , 2013, Computer.
[19] Keith Jeffery,et al. A ROADMAP FOR ADVANCED CLOUD TECHNOLOGIES UNDER H 2020 Recommendations by the Cloud Expert Group , 2012 .