[1]
Subashini, S. and V. Kavitha. A survey on security issues in service delivery models of cloud computing [J]. Journal of Network and Computer Applications. 2011, 34(1): 1-11.
DOI: 10.1016/j.jnca.2010.07.006
Google Scholar
[2]
Jamil, D. and H. Zaki. Cloud computing security [J]. International Journal of Engineering Science and Technology (IJEST). 2011, 3(4): 3478-3483.
Google Scholar
[3]
eGov2015. Cloud Computing for Government,. 2012; Available from: http: /www. egov. gov. sg/egov-programmes/programmes-by-government/cloud-computing-for-government.
Google Scholar
[4]
Chow, R. and so on. Controlling data in the cloud: outsourcing computation without outsourcing control [C]. Proceedings 2009 ACM workshop on Cloud computing security. (2009).
DOI: 10.1145/1655008.1655020
Google Scholar
[5]
Jensen, M. and so on. On technical security issues in cloud computing [C]. Proceedings 2009 IEEE International Conference on Cloud Computing. (2009).
DOI: 10.1109/cloud.2009.60
Google Scholar
[6]
Armbrust, M. and so on. A view of cloud computing [J]. Communications of the ACM. 2010, 53(4): 50-58.
Google Scholar
[7]
Popovic, K. and Z. Hocenski. Cloud computing security issues and challenges [C]. 2010 Proceedings of the 33rd International Convention. (2010).
Google Scholar
[8]
Buyya, R., C.S. Yeo, and S. Venugopal. Market-oriented cloud computing: Vision, hype, and reality for delivering it services as computing utilities,. 2008. IEEE.
DOI: 10.1109/hpcc.2008.172
Google Scholar
[9]
Craven, B. Cloud technology and how it can help you make an ERP decision for your organization,. 2011; Available from: http: /www. erp-common-sense. com/cloud-technology. html.
Google Scholar