A Security Architecture Research Based on Roles
暂无分享,去创建一个
[1] 曹继翔. Cloud computing security system and method , 2014 .
[2] G.Madhu kumar,et al. Design and implementation of convolution encoder and viterbi decoder , 2012 .
[3] Chi Li-ying. Research on Security Architecture of Cloud Computing and its Key Technologies , 2012 .
[4] Liu Bao-xu. Model for Cloud Computing Security Assessment Based on Classified Protection , 2013 .
[5] Jeremy M. Kaplan,et al. Cloud-Trust—a Security Assessment Model for Infrastructure as a Service (IaaS) Clouds , 2017, IEEE Transactions on Cloud Computing.
[6] Sanjaya Dahal,et al. Security Architecture for Cloud Computing Platform , 2012 .
[7] Muthu Ramachandran. Component-Based Development for Cloud Computing Architectures , 2011 .
[8] Mohamed Ali Maher,et al. Ballistic Characterization Of A Typical Military Steel Helmet , 2017 .
[9] Xu Ji. Cloud Computing Security: Architecture, Mechanism and Modeling , 2015 .
[10] Ashutosh Kumar Singh,et al. A Review Of Cloud Computing Open Architecture And Its Security Issues , 2012 .
[11] Takuya Suzuki,et al. Security Architectures for Cloud Computing , 2010 .
[12] Robin Singh Bhadoria. Security Architecture for Cloud Computing , 2015 .
[13] D. M. Hutton,et al. Securing the Cloud: Cloud Computer Security Techniques and Tactics , 2012 .
[14] Vic Winkler. Introduction to Cloud Computing and Security , 2011 .
[15] Meikang Qiu,et al. A Review on Cloud Computing: Design Challenges in Architecture and Security , 2011, J. Comput. Inf. Technol..