Local authentication and authorization system for immediate setup of cloud environments
暂无分享,去创建一个
[1] Tadeusz Pietraszek,et al. Defending Against Injection Attacks Through Context-Sensitive String Evaluation , 2005, RAID.
[2] Odej Kao,et al. Hardware as a Service (HaaS): Physical and virtual hardware on demand , 2012, 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings.
[3] T. Howes. The Lightweight Directory Access Protocol: X.500 Lite , 1995 .
[4] A. Bendahmane,et al. Grid computing security mechanisms: State-of-the-art , 2009, 2009 International Conference on Multimedia Computing and Systems.
[5] Sébastien Varrette,et al. Practical Authentication in Distributed Environments , 2005 .
[6] Yaodong Li,et al. Study and Implementation of SELinux-Like Access Control Mechanism Based on Linux , 2008 .
[7] A. Stanik,et al. Hardware as a Service (HaaS): The completion of the cloud stack , 2012, 2012 8th International Conference on Computing Technology and Information Management (NCM and ICNIT).
[8] Katarina Stanoevska-Slabeva,et al. Grid and Cloud Computing, A Business Perspective on Technology and Applications , 2009, Grid and Cloud Computing.
[9] V. Kavitha,et al. A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..