[1]
Wanyun Lei : Cloud Computing—Technology, Platform and Application Case . Beijing: Tsinghua University Press (2011).
Google Scholar
[2]
Jay Heiser, Mark Nicolett. Assessing the Security Risks of Cloud Computing[EB/CL]. Garmer Techndogy Business Research In—sight. (2008).
Google Scholar
[3]
Weiss A. Computing in the Clouds[J]. networker. ACM. (2007).
Google Scholar
[4]
Gannon D. Head in the cloud[J]. Nature . (2007).
Google Scholar
[5]
Amazon Elastic Compute Cloud. http: /aws. amazon. com/ec2.
Google Scholar
[6]
Siani Pearson, Yun Chen . A Privacy Manager for Cloud Computing[EB/OL]. HPlabs.
Google Scholar
[7]
Micheal A, Armando F, Rean G. Above the clouds: A Berkeley View of Cloud Computing. Technical Report, UCB/EECS-2009-28. University of California at Berkeley . February , (2009).
Google Scholar
[8]
Foster. I, Kesselman C. The Grid: Blue Print for a New Computing Infrastructure. Morgan Kanfmann(2nd edition. ), (2004).
Google Scholar
[9]
P. Watson, P. Lord, F. Gibson, P. Periorellis, G. Pitsilis. Cloud Computing for e-Science with CARMEN[C]. IBERGRID, 2008. 05.
Google Scholar
[10]
Petreni Jr N, Hick M. Automated detection of persistent kernel control flow attacks[C]. Proceeding of the 14 ACM conference on computer and communication security. ACM New York. (2007).
DOI: 10.1145/1315245.1315260
Google Scholar
[11]
Chen X, Garfinkel T. Overshadow: a virtualization-based approach to retrofitting protection in commodity operating systems[C]. Proceeding of the 13 International Conference on Architecture Support for Promgramming and Operation Systems. ACM New York, USA. 2008: 2-13.
DOI: 10.1145/1353535.1346284
Google Scholar