[1]
Wanyun Lei: Cloud Computing - Technology, Platform and Application Case , Beijing: Tsinghua University Press, (2011).
Google Scholar
[2]
Siani Pearson, Yun Chen. A Privacy Manager for Cloud Computing[EB/OL]. HPlabs.
Google Scholar
[3]
Jay Heiser, Mark Nicolett. Assessing the Security Risks of Cloud Computing[EB/CL]. Garmer Techndogy Business Research In—sight. (2008).
Google Scholar
[4]
Chow R, Golle P. et al. Controlling data in the cloud: Outsourcing computation without outsourcing control . In : Proc. of the 2009 ACM Workshop on Cloud Computing Security. (2009).
DOI: 10.1145/1655008.1655020
Google Scholar
[5]
Wei j, Zhang X, Amons G, Bala V , Ning P. Managing security of virtual machine images in a cloud environment . In : Proc. of the 2009 ACM Workshop on Cloud Computing Security . (2009).
DOI: 10.1145/1655008.1655021
Google Scholar
[6]
Shafiq B, Joshi JBD, Bertino E, et al. Secure interoperation in a multidomain environment employing RBAC policies . IEEE Trans. on Knowledge and Data Engineering , (2005).
DOI: 10.1109/tkde.2005.185
Google Scholar
[7]
Micheal A, Armando F, Rean G. Above the clouds: A Berkeley View of Cloud Computing. Technical Report, UCB/EECS-2009-28. University of California at Berkeley . February 10, (2009).
Google Scholar
[8]
P. Watson , P. Lord ,F. Gibson , P. Periorellis , G . Pitsilis. Cloud Computing for e-Science with CARMEN[C]. IBERGRID, (2008).
Google Scholar
[9]
Wang Q, Wang C, Li J, Ren K , Lou W . Enabling public verifiability and data dynamics for storage security in Cloud Computing . In : Proc . of the 14th European Symp. On Research in Computer Security . Saint Malo, (2009).
DOI: 10.1007/978-3-642-04444-1_22
Google Scholar