Secure User Data in Cloud Computing Using Encryption Algorithms
暂无分享,去创建一个
[1] Maya Daneva,et al. Cloud computing security requirements: A systematic review , 2012, 2012 Sixth International Conference on Research Challenges in Information Science (RCIS).
[2] P. Mell,et al. The NIST Definition of Cloud Computing , 2011 .
[3] Xi He,et al. Cloud Computing: a Perspective Study , 2010, New Generation Computing.
[4] Siani Pearson,et al. Privacy, Security and Trust Issues Arising from Cloud Computing , 2010, 2010 IEEE Second International Conference on Cloud Computing Technology and Science.
[5] Sakshi Kaushal,et al. Security Concerns in Cloud Computing , 2011, Grid 2011.
[6] J. K. Wang,et al. Data security and authentication in hybrid cloud computing model , 2012, 2012 IEEE Global High Tech Congress on Electronics.
[7] Borko Furht,et al. Handbook of Cloud Computing , 2010 .
[8] VAMSEE KRISHNA YARLAGADDA,et al. Data Security in Cloud Computing , 2011 .
[9] Sugata Sanyal,et al. Survey on Security Issues in Cloud Computing and Associated Mitigation Techniques , 2012, ArXiv.
[10] Shufen Zhang,et al. Cloud Computing Research and Development Trend , 2010, 2010 Second International Conference on Future Networks.
[11] Eui-nam Huh,et al. Personal Cloud Computing Security Framework , 2010, 2010 IEEE Asia-Pacific Services Computing Conference.