World of Cloud Computing & Security
暂无分享,去创建一个
[1] Costas Lambrinoudakis,et al. Cryptography Goes to the Cloud , 2011, STA Workshops.
[2] Liang Yan,et al. Strengthen Cloud Computing Security with Federal Identity Management Using Hierarchical Identity-Based Cryptography , 2009, CloudCom.
[3] Wei Xie,et al. Security and Privacy in Cloud Computing: A Survey , 2010, 2010 Sixth International Conference on Semantics, Knowledge and Grids.
[4] Radu Sion,et al. Proceedings of the 2010 ACM workshop on Cloud computing security workshop , 2010, CCS 2010.
[5] Lizhe Wang,et al. Scientific Cloud Computing: Early Definition and Experience , 2008, 2008 10th IEEE International Conference on High Performance Computing and Communications.
[6] Jianfeng Yang,et al. Cloud Computing Research and Security Issues , 2010, 2010 International Conference on Computational Intelligence and Software Engineering.
[7] S Ramgovind,et al. The management of security in Cloud computing , 2010, 2010 Information Security for South Africa.
[8] Ling Tian,et al. Identity-Based Authentication for Cloud Computing , 2009, CloudCom.
[9] Bernd Grobauer,et al. Understanding Cloud Computing Vulnerabilities , 2011, IEEE Security & Privacy.