using Fragmentation in Cloud Computing
暂无分享,去创建一个
Shareeful Islam | Peter Kieseberg | Edgar Weippl | Aleksandar Hudic | E. Weippl | Shareeful Islam | Aleksandar Hudic | Peter Kieseberg
[1] Bernd Grobauer,et al. Understanding Cloud Computing Vulnerabilities , 2011, IEEE Security & Privacy.
[2] Gail-Joon Ahn,et al. Security and Privacy Challenges in Cloud Computing Environments , 2010, IEEE Security & Privacy.
[3] Peeyush Mathur,et al. Cloud computing: New challenge to the entire computer industry , 2010, 2010 First International Conference On Parallel, Distributed and Grid Computing (PDGC 2010).
[4] Sushil Jajodia,et al. Combining fragmentation and encryption to protect privacy in data storage , 2010, TSEC.
[5] Markus Jakobsson,et al. Controlling data in the cloud: outsourcing computation without outsourcing control , 2009, CCSW '09.
[6] Albert G. Greenberg,et al. The cost of a cloud: research problems in data center networks , 2008, CCRV.
[7] Maik A. Lindner,et al. A break in the clouds: towards a cloud definition , 2008, CCRV.
[8] Brian Randell,et al. A note on storage fragmentation and program segmentation , 1969, CACM.
[9] Kevin W. Hamlen,et al. Security Issues in Cloud Computing , 2012 .
[10] V. Kavitha,et al. A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..
[11] Lori M. Kaufman,et al. Data Security in the World of Cloud Computing , 2009, IEEE Security & Privacy.
[12] Richard W. Scamell,et al. Data Modeling and Database Design , 2007 .