Selected aspects of security mechanisms for cloud computing – current solutions and development perspectives
暂无分享,去创建一个
[1] Ronald L. Krutz,et al. Cloud Security: A Comprehensive Guide to Secure Cloud Computing , 2010 .
[2] Xiaohua Jia,et al. Security for Cloud Storage Systems , 2013, SpringerBriefs in Computer Science.
[3] Gary Anthes,et al. Security in the cloud , 2010, Commun. ACM.
[4] D. M. Hutton,et al. Securing the Cloud: Cloud Computer Security Techniques and Tactics , 2012 .
[5] Athanasios V. Vasilakos,et al. Security in cloud computing: Opportunities and challenges , 2015, Inf. Sci..
[6] Mohammad Ilyas,et al. Cloud Computing and Software Services: Theory and Techniques , 2010 .
[7] Cong Wang,et al. Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing , 2009, ESORICS.
[8] Dimitrios Zissis,et al. Addressing cloud computing security issues , 2012, Future Gener. Comput. Syst..
[9] Timothy Grance,et al. Guidelines on Security and Privacy in Public Cloud Computing | NIST , 2012 .
[10] V. Kavitha,et al. A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..
[11] A. Poniszewska-Marańda. Modeling and design of role engineering in development of access control for dynamic information systems , 2013 .
[12] 杨泽明,et al. 云计算安全 : 架构、战略、标准与运营 = Securing the cloud : cloud computer security techniques and t , 2013 .
[13] John Doe,et al. Cloud Computing and Software Services: Theory and Technique , 2009 .
[14] Mohamed Hamdi,et al. Security of Cloud Computing , 2015 .
[15] Gail-Joon Ahn,et al. Security and Privacy Challenges in Cloud Computing Environments , 2010, IEEE Security & Privacy.
[16] Toby Velte,et al. Cloud Computing, A Practical Approach , 2009 .
[17] Aneta Poniszewska-Maranda,et al. Role engineering: From design to evolution of security schemes , 2008, J. Syst. Softw..
[18] Yong Zhao,et al. Cloud Computing and Grid Computing 360-Degree Compared , 2008, GCE 2008.
[19] Randy H. Katz,et al. A view of cloud computing , 2010, CACM.