[1]
Feng G. D., etc. 2011 Cloud computing security research [J], Journal of Software, 22(1): 71-83.
Google Scholar
[2]
Amazon Web Service. 2002. AWS [EB/OL]. http: /aws. amazon. com.
Google Scholar
[3]
Blue Cloud. 2007. IBM Introduces Ready-to-use Cloud Computing [EB/OL]. Http: /www-03. ibm. com/press/us/en/pressrelease/22613. wss.
Google Scholar
[4]
C1oudEx. 2009. Century Internet [EB/OL]. http: /www. cloudex. cn.
Google Scholar
[5]
Google. com. 2009. Developer's Guide [EB/OL]. http: /code. google. com/appengine/docs /whatisgoolgeappengine. html.
Google Scholar
[6]
Salesforce. 2012. Salesforce. com [EB/OL]. http: /work. cozn.
Google Scholar
[7]
Lu S. 2008. Computer virtualization technology and application [M]. Beijing: Mechanical Industry Press.
Google Scholar
[8]
Sun Y., et al . 2003. Design and Implementation of Distributed Redundant management system reliability [J]. Computer Engineering and Applications, 8 (15): 140-142, 170.
Google Scholar
[9]
CDN. 2000. Content Delivery Network, CDNetwoks [EB/OL]. http: //www. nirvanix. com.
Google Scholar
[10]
Pan H. B., etc. 2008. Analysis of data encryption technology [J]. Silicon Valley, 2: 27-28.
Google Scholar
[11]
Yan H. M., etc. 2006. Research data backup technology grid system [J]. Computer Application Research, 23 (12): 160-162.
Google Scholar
[12]
Hou H. B., etc. 2004. Overview of disaster recovery technology [J]. Network Security Techno- logy and Application, 9: 11-14.
Google Scholar