A broker-based cooperative security-SLA evaluation methodology for personal cloud computing
暂无分享,去创建一个
[1] Martin Gilje Jaatun,et al. Security in Service Level Agreements for Cloud Computing , 2011, CLOSER.
[2] Biao Song,et al. A market-oriented dynamic collaborative cloud services platform , 2010, Ann. des Télécommunications.
[3] Yang Wang,et al. On-Demand Security Architecture for Cloud Computing , 2012, Computer.
[4] Martin Gilje Jaatun,et al. Security SLAs for Federated Cloud Services , 2011, 2011 Sixth International Conference on Availability, Reliability and Security.
[5] Yonghua Zhu,et al. The SLA Evaluation Model for Cloud Computing , 2013 .
[6] Eui-Nam Huh,et al. Threats Evaluation for SLAs in Cloud Computing , 2013 .
[7] Thomas L. Saaty,et al. Decision making with dependence and feedback : the analytic network process : the organization and prioritization of complexity , 1996 .
[8] Eui-nam Huh,et al. Personal Cloud Computing Security Framework , 2010, 2010 IEEE Asia-Pacific Services Computing Conference.
[9] Dimitrios Zissis,et al. Addressing cloud computing security issues , 2012, Future Gener. Comput. Syst..
[10] Akhil Sahai,et al. Specifying and monitoring guarantees in commercial grids through SLA , 2003, CCGrid 2003. 3rd IEEE/ACM International Symposium on Cluster Computing and the Grid, 2003. Proceedings..
[11] Mark Ryan,et al. Cloud computing security: The scientific challenge, and a survey of solutions , 2013, J. Syst. Softw..
[12] Eui-nam Huh,et al. Refundable Service through Cloud Brokerage , 2013, 2013 IEEE Sixth International Conference on Cloud Computing.
[13] Biao Song,et al. A novel Threat Evaluation method for privacy-aware system in RFID , 2011, Int. J. Ad Hoc Ubiquitous Comput..
[14] Martin Gilje Jaatun,et al. Beyond lightning: A survey on security challenges in cloud computing , 2013, Comput. Electr. Eng..
[15] Thomas L. Saaty,et al. How to Make a Decision: The Analytic Hierarchy Process , 1990 .