Trust and privacy concern in the Cloud
暂无分享,去创建一个
[1] Yoichi Muraoka,et al. HPC Benchmarks on Amazon EC2 , 2010, 2010 IEEE 24th International Conference on Advanced Information Networking and Applications Workshops.
[2] Dan Lin,et al. Preventing Information Leakage from Indexing in the Cloud , 2010, 2010 IEEE 3rd International Conference on Cloud Computing.
[3] Victor I. Chang,et al. A Review of Cloud Business Models and Sustainability , 2010, 2010 IEEE 3rd International Conference on Cloud Computing.
[4] Feng Wang,et al. Application of Cloud Computing in the Network Learning Environment , 2010, 2010 International Symposium on Computational Intelligence and Design.
[5] T. S. Raghu,et al. The Information Assurance Practices of Cloud Computing Vendors , 2010, IT Professional.
[6] Feiyi Wang,et al. Analysis of techniques for building intrusion tolerant server systems , 2003, IEEE Military Communications Conference, 2003. MILCOM 2003..
[7] Jinzhu Kong. A Practical Approach to Improve the Data Privacy of Virtual Machines , 2010, 2010 10th IEEE International Conference on Computer and Information Technology.
[8] Khaled M. Khan,et al. Establishing Trust in Cloud Computing , 2010, IT Professional.
[9] Gurpreet Dhillon,et al. Computer crimes: theorizing about the enemy within , 2001, Comput. Secur..
[10] Markus Jakobsson,et al. Controlling data in the cloud: outsourcing computation without outsourcing control , 2009, CCSW '09.