Improved Technique for Data Confidentiality in Cloud Environment
暂无分享,去创建一个
[1] Yong Tang,et al. Trusted Data Sharing over Untrusted Cloud Storage Providers , 2010, 2010 IEEE Second International Conference on Cloud Computing Technology and Science.
[2] Dimitrios Zissis,et al. Addressing cloud computing security issues , 2012, Future Gener. Comput. Syst..
[3] Rajkumar Buyya,et al. Mastering Cloud Computing: Foundations and Applications Programming , 2013 .
[4] Daniele Sgandurra,et al. Cloud security is not (just) virtualization security: a short paper , 2009, CCSW '09.
[5] E. S. Pilli,et al. Cloud Forensics: State-of-the-Art and Research Challenges , 2012, 2012 International Symposium on Cloud and Services Computing.
[6] Xinlei Wang,et al. Research of cloud computing data security technology , 2012, 2012 2nd International Conference on Consumer Electronics, Communications and Networks (CECNet).
[7] Sandeep K. Sood,et al. A combined approach to ensure data security in cloud computing , 2012, J. Netw. Comput. Appl..
[8] Abhishek Vaish,et al. 3 dimensional security in cloud computing , 2011, 2011 3rd International Conference on Computer Research and Development.
[9] Paolo Balboni. Data Protection and Data Security Issues Related to Cloud Computing in the EU , 2010, ISSE.
[10] Daniele Sgandurra,et al. Cloud Security Is Not (Just) Virtualization Security , 2009 .
[11] Wei Xie,et al. Security and Privacy in Cloud Computing: A Survey , 2010, 2010 Sixth International Conference on Semantics, Knowledge and Grids.