Improving the Security of Cloud Computing using Trusted Computing Technology
暂无分享,去创建一个
[1] Tal Garfinkel,et al. Flexible OS Support and Applications for Trusted Computing , 2003, HotOS.
[2] Mohammad Nauman,et al. Towards platform-independent trusted computing , 2009, STC '09.
[3] Balachandra Reddy Kandukuri,et al. Cloud Security Issues , 2009, 2009 IEEE International Conference on Services Computing.
[4] Rao Mikkilineni,et al. Cloud Computing and the Lessons from the Past , 2009, 2009 18th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises.
[5] Haklin Kimm,et al. Security in Distributed Computing , 1998, Scalable Comput. Pract. Exp..
[6] Ed Dawson,et al. Privacy and trusted computing , 2003, 14th International Workshop on Database and Expert Systems Applications, 2003. Proceedings..
[7] Zhidong Shen,et al. The security of cloud computing system enabled by trusted computing technology , 2010, 2010 2nd International Conference on Signal Processing Systems.
[8] P. Visalakshi,et al. International Journal of Modern Engineering Research (IJMER) www.ijmer.com Pp-63-69 ISSN: 2249-6645 , 2013 .
[9] Martín Abadi,et al. Logic in access control , 2003, 18th Annual IEEE Symposium of Logic in Computer Science, 2003. Proceedings..