Security Aspects in Utility Computing
暂无分享,去创建一个
[1] Athanasios V. Vasilakos,et al. Security in cloud computing: Opportunities and challenges , 2015, Inf. Sci..
[2] Javier Jiménez,et al. Network virtualization: a view from the bottom , 2009, VISA '09.
[3] Farrukh Shahzad,et al. State-of-the-art Survey on Cloud Computing Security Challenges, Approaches and Solutions , 2014, EUSPN/ICTH.
[4] John Soldatos,et al. Convergence of Utility Computing with the Internet-of-Things , 2012, 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.
[5] John Darlington,et al. An Architecture for a Next-Generation Internet Based on Web Services and Utility Computing , 2006, 15th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE'06).
[6] Craig E. Wills,et al. Agility in Virtualized Utility Computing , 2007, Proceedings of the 2nd International Workshop on Virtualization Technology in Distributed Computing (VTDC '07).
[7] G.J. Minden,et al. A survey of active network research , 1997, IEEE Communications Magazine.
[8] H. Madsen,et al. Reliability in the utility computing era: Towards reliable Fog computing , 2013, 2013 20th International Conference on Systems, Signals and Image Processing (IWSSIP).
[9] Olav Lysne,et al. Interconnection Networks: Architectural Challenges for Utility Computing Data Centers , 2008, Computer.