Seven Deadly Threats and Vulnerabilities in Cloud Computing
暂无分享,去创建一个
[1] Li Shen,et al. A Novel Hardware Assisted Full Virtualization Technique , 2008, 2008 The 9th International Conference for Young Computer Scientists.
[2] Eystein Mathisen,et al. Security challenges and solutions in cloud computing , 2011, 5th IEEE International Conference on Digital Ecosystems and Technologies (IEEE DEST 2011).
[3] V. Kavitha,et al. A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..
[4] Bernd Grobauer,et al. Understanding Cloud Computing Vulnerabilities , 2011, IEEE Security & Privacy.
[5] Mervat Adib Bamiah,et al. Challenges and Benefits for Adopting the Paradigm of Cloud Computing , 2011 .
[6] Mark Perry,et al. Clarifying Privacy in the Clouds , 2011 .
[7] Stephen Farrell. Portable Storage and Data Loss , 2008, IEEE Internet Computing.
[8] Paul T. Jaeger,et al. Weathering the Storm: The Policy Implications of Cloud Computing , 2009 .
[9] James K Wangari. Vendor lock-in and cloud computing at seven seas technologies group (SST) , 2013 .