A novel methodology for security and privacy of cloud computing and its use in e-Governance
暂无分享,去创建一个
[1] S. Agaian. Hadamard Matrices and Their Applications , 1985 .
[2] Jennifer Seberry,et al. Product of Four Hadamard Matrices , 1992, J. Comb. Theory, Ser. A.
[3] Balachandra Reddy Kandukuri,et al. Cloud Security Issues , 2009, 2009 IEEE International Conference on Services Computing.
[4] Jie Qiu,et al. The Method and Tool of Cost Analysis for Cloud Computing , 2009, 2009 IEEE International Conference on Cloud Computing.
[5] Jemal H. Abawajy,et al. A Layered Security Approach for Cloud Computing Infrastructure , 2009, 2009 10th International Symposium on Pervasive Systems, Algorithms, and Networks.
[6] Chris Rose,et al. A Break in the Clouds: Towards a Cloud Definition , 2011 .
[7] Siani Pearson,et al. Privacy, Security and Trust Issues Arising from Cloud Computing , 2010, 2010 IEEE Second International Conference on Cloud Computing Technology and Science.
[8] S. Agaian,et al. Parametric Slant-Hadamard transforms with applications , 2002, IEEE Signal Processing Letters.
[9] Giuseppe Di Battista,et al. 26 Computer Networks , 2004 .
[10] Trent Jaeger,et al. Outlook: Cloudy with a Chance of Security Challenges and Improvements , 2010, IEEE Security & Privacy.
[11] Jennifer Seberry,et al. On the Existence of Hadamard Matrices , 1976, J. Comb. Theory, Ser. A.
[12] Leonard Kleinrock,et al. An Internet vision: the invisible global infrastructure , 2003, Ad Hoc Networks.
[13] Lakshmi Sobhana Kalli,et al. Market-Oriented Cloud Computing : Vision , Hype , and Reality for Delivering IT Services as Computing , 2013 .