Log-Based Approach for Security Implementation in Cloud CRM’s
暂无分享,去创建一个
[1] Raffael Marty,et al. Cloud application logging for forensics , 2011, SAC.
[2] Siyu Xiao,et al. Application Research of CRM Based on SaaS , 2010, 2010 International Conference on E-Business and E-Government.
[3] M. Vanitha,et al. Performance enhanced security for enterprise cloud application , 2016, 2016 International Conference on Computer Communication and Informatics (ICCCI).
[4] Simone Braun,et al. Towards Efficient and Secure Data Storage in Multi-tenant Cloud-Based CRM Solutions , 2015, 2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC).
[5] Imre Petkovic,et al. CRM in the cloud , 2010, IEEE 8th International Symposium on Intelligent Systems and Informatics.
[6] Nitin Mishra. Encrypted IT Auditing and Log Management on Cloud Computing , 2011 .
[7] Mahdi Seify,et al. New Method for Risk Management in CRM Security Management , 2006, Third International Conference on Information Technology: New Generations (ITNG'06).
[8] Yonggang Wen,et al. StealthyCRM: A Secure Cloud CRM System Application that Supports Fully Homomorphic Database Encryption , 2015, 2015 International Conference on Cloud Computing Research and Innovation (ICCCRI).
[9] Ahmad Ghafarian. Foreniscs analysis of cloud computing services , 2015, 2015 Science and Information Conference (SAI).