Pragmatic approach to conquer security perturbation in cloud computing using level classification
暂无分享,去创建一个
[1] Randy H. Katz,et al. Above the Clouds: A Berkeley View of Cloud Computing , 2009 .
[2] Robert L. Grossman,et al. The Case for Cloud Computing , 2009, IT Professional.
[3] Balachandra Reddy Kandukuri,et al. Cloud Security Issues , 2009, 2009 IEEE International Conference on Services Computing.
[4] G. Karagiannis,et al. Cloud computing services: taxonomy and comparison , 2011, Journal of Internet Services and Applications.
[5] Low Tang Jung,et al. K-NN classifier for data confidentiality in cloud computing , 2014, 2014 International Conference on Computer and Information Sciences (ICCOINS).
[6] Manas Ranjan Patra,et al. Cloud Computing: Security Issues and Research Challenges , 2011 .
[7] Carla Merkle Westphall,et al. Intrusion Detection for Grid and Cloud Computing , 2010, IT Professional.
[8] Elaine Shi,et al. Cloud Data Protection for the Masses , 2012, Computer.
[9] Daniele Catteddu and Giles Hogben. Cloud Computing. Benefits, risks and recommendations for information security , 2009 .
[10] Liang Zhong,et al. EnaCloud: An Energy-Saving Application Live Placement Approach for Cloud Computing Environments , 2009, 2009 IEEE International Conference on Cloud Computing.
[11] Jörg Schwenk,et al. On Technical Security Issues in Cloud Computing , 2009, 2009 IEEE International Conference on Cloud Computing.
[12] Tim Mather,et al. Cloud Security and Privacy - An Enterprise Perspective on Risks and Compliance , 2009, Theory in practice.
[13] Raouf Boutaba,et al. Cloud computing: state-of-the-art and research challenges , 2010, Journal of Internet Services and Applications.
[14] Thair Nu Phyu. Survey of Classification Techniques in Data Mining , 2009 .
[15] Daniele Catteddu,et al. Cloud Computing: Benefits, Risks and Recommendations for Information Security , 2009 .
[16] K. Scarfone,et al. Guidelines for Managing the Security of Mobile Devices in the Enterprise , 2013 .