[1]
Information on http: /blogs. idc. com/ie/?p=210.
Google Scholar
[2]
Chow R, Golle P, Jakobsson M, et al, in: Controlling Data in the Cloud: Outsourcing Computation without Outsourcing Control, Proceedings of the 2009 ACM Workshop on Cloud Computing Security, CCSW '09, (2009).
DOI: 10.1145/1655008.1655020
Google Scholar
[3]
Celesti A, Tusa F, Villari M, A Puliafito, in: Security and Cloud Computing: InterCloud Identity Management Infrastructure, Proceedings of the 19th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, Larissa, Greece(2010).
DOI: 10.1109/wetice.2010.49
Google Scholar
[4]
Santos N, Gummadi K P, Rodrigues R, in: TowardsTrusted Cloud Computing, Proceedings of the 2009 conference on Hot topics in cloud computing (2009).
Google Scholar
[5]
Sadeghi A R, Schneider T, Winandy M, in: Token-Based Cloud Computing: Secure Outsourcing of Data and Arbitrary Computations with Lower Latency, Proceedings of the 3rd International Conference on Trust and Trustworthy Computing, Berlin, Germany(2010).
DOI: 10.1007/978-3-642-13869-0_30
Google Scholar
[6]
Shen Z D, Tong Q, in: The Security of Cloud Computing System Enabled by Trusted Computing Technology, Proceedings of the 2nd International Conference on Signal Processing Systems, Dalian China(2010).
DOI: 10.1109/icsps.2010.5555234
Google Scholar
[7]
Saripalli P, Walters B, in: QUIRC: A Quantitative Impact and Risk Assessment Framework for Cloud Security, Proceedings of 3rd International Conference on Cloud Computing (2010).
DOI: 10.1109/cloud.2010.22
Google Scholar
[8]
Li W, Ping L, in: Trust Model to Enhance Security and Interoperability of Cloud Environment, Proceedings of the 1st International Conference on Cloud Computing, Beijing China(2009).
DOI: 10.1007/978-3-642-10665-1_7
Google Scholar
[9]
Hwang K, Kulkarni S, Hu Y, in: Cloud Security with Virtualized Defense and Reputation-Based Trust Mangement, Proceedings of Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing, Chendu China(2009).
DOI: 10.1109/dasc.2009.149
Google Scholar