Improvement of network security algorithm for cloud computing
暂无分享,去创建一个
[1] Marti A. Hearst,et al. Why phishing works , 2006, CHI.
[2] Chandra Krintz,et al. Evaluating the Performance Impact of Xen on MPI and Process Execution For HPC Systems , 2006, First International Workshop on Virtualization Technology in Distributed Computing (VTDC 2006).
[3] Mike P. Papazoglou,et al. Service oriented architectures: approaches, technologies and research issues , 2007, The VLDB Journal.
[4] Rolf Stadler,et al. Robust monitoring of network-wide aggregates through gossiping , 2007, IEEE Transactions on Network and Service Management.
[5] Dimitrios S. Nikolopoulos,et al. Application-Specific Customization on Many-Core Platforms: The VT-ASOS Framework , 2007 .
[6] Chandra Krintz,et al. Linux kernel special-ization for scientific application performance , 2005 .
[7] Diomidis Spinellis,et al. A survey of peer-to-peer content distribution technologies , 2004, CSUR.
[8] Andreas Schaad,et al. Towards secure SOAP message exchange in a SOA , 2006, SWS '06.
[9] Richard Wolski,et al. The impact of paravirtualized memory hierarchy on linear algebra computational kernels and software , 2008, HPDC '08.
[10] Michael McIntosh,et al. XML signature element wrapping attacks and countermeasures , 2005, SWS '05.
[11] Eric Rescorla,et al. The Transport Layer Security (TLS) Protocol Version 1.2 , 2008, RFC.
[12] Chandra Krintz,et al. Using phase behavior in scientific application to guide Linux operating system customization , 2005, 19th IEEE International Parallel and Distributed Processing Symposium.
[13] Richard Wolski,et al. The network weather service: a distributed resource performance forecasting service for metacomputing , 1999, Future Gener. Comput. Syst..
[14] Anne-Marie Kermarrec,et al. Managing clouds: a case for a fresh look at large unreliable dynamic networks , 2006, OPSR.
[15] Myeonggil Choi. The Security Risks of Cloud Computing , 2019 .