From Mainframe to Cloud
暂无分享,去创建一个
[1] Hiroyuki Sato,et al. Risk Management on the Security Problem in Cloud Computing , 2011, 2011 First ACIS/JNU International Conference on Computers, Networks, Systems and Industrial Engineering.
[2] Yushi Shen,et al. Enabling the New Era of Cloud Computing: Data Security, Transfer, and Management , 2013 .
[3] Y. Khalidi,et al. Building a Cloud Computing Platform for New Possibilities , 2011, Computer.
[4] Victor Chang,et al. Delivery and Adoption of Cloud Computing Services in Contemporary Organizations , 2015 .
[5] Dean Gonsowski. Compliance in the Cloud and the Implications on Electronic Discovery , 2015 .
[6] Fawzy Soliman. Business Transformation and Sustainability through Cloud System Implementation , 2014 .
[7] Mark S. Granovetter. The Strength of Weak Ties , 1973, American Journal of Sociology.
[8] Cong Wang,et al. Security Challenges for the Public Cloud , 2012, IEEE Internet Computing.
[9] Asad Waqar Malik,et al. Ceaseless Virtual Appliance Streaming: Creation and Transmission of Virtual Packs over Network , 2016 .
[10] Klaus-Dieter Schewe,et al. Challenges in Cloud Computing , 2011, Scalable Comput. Pract. Exp..
[11] Shufen Zhang,et al. Cloud Computing Research and Development Trend , 2010, 2010 Second International Conference on Future Networks.
[12] Raihan Ur Rasool,et al. Managing and Processing Big Data in Cloud Computing , 2016 .
[13] Rajkumar Buyya,et al. Article in Press Future Generation Computer Systems ( ) – Future Generation Computer Systems Cloud Computing and Emerging It Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility , 2022 .
[14] Gail-Joon Ahn,et al. Security and Privacy Challenges in Cloud Computing Environments , 2010, IEEE Security & Privacy.
[15] Robert John Walters,et al. A Resource Allocation Model for Desktop Clouds , 2015, Web Services.
[16] Luis Miguel Vaquero Gonzalez,et al. Locking the sky: a survey on IaaS cloud security , 2010, Computing.
[17] Mohamed Firdhous,et al. Strategies for Evaluating Cloud System Providers during the Transformation of Businesses , 2015 .
[18] V. Kavitha,et al. A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..
[19] Bernd Grobauer,et al. Understanding Cloud Computing Vulnerabilities , 2011, IEEE Security & Privacy.
[20] Yushi Shen,et al. Data Protection in the Cloud Era , 2014 .
[21] P. Mell,et al. The NIST Definition of Cloud Computing , 2011 .
[22] Farzad Sabahi,et al. Cloud computing security threats and responses , 2011, 2011 IEEE 3rd International Conference on Communication Software and Networks.
[23] Kyle Chard,et al. Social Cloud: Cloud Computing in Social Networks , 2010, 2010 IEEE 3rd International Conference on Cloud Computing.
[24] Mark S. Granovetter. T H E S T R E N G T H O F WEAK TIES: A NETWORK THEORY REVISITED , 1983 .
[25] Zhidong Shen,et al. The security of cloud computing system enabled by trusted computing technology , 2010, 2010 2nd International Conference on Signal Processing Systems.