[1]
The Force. com Multitenant Architecture, http: /www. salesforce. com /au/assets/pdf/Force. com_ Multitenancy_WP_101508. pdf, 2009, 11, 8.
Google Scholar
[2]
Curt Devlin, SaaS Capacity Planning: Transaction Cost Analysis Revisited, http: /msdn. microsoft. com/en-us/architecture/cc261632. asp x, 2009, 11, 8.
Google Scholar
[3]
CCW Research. SaaS applications in China has the 5characteristics [J]. China Computer World, 2008, 2(45): 1-2.
Google Scholar
[4]
Vidyanand Choudhary. Comparison of Software Quality Under Perpetual Licensing and Software as a Service[J]. Journal of Management Information Systems, 2007, 24(2): 141-165.
DOI: 10.2753/mis0742-1222240206
Google Scholar
[5]
Wei Sun, Kuo Zhang, Shyh-Kwei Chen, et al. Software as a Service: An Integration Perspective[C], ICSOC, Vienna, Austria, 2007, 9, LNCS, 4749/2009: 558-569.
Google Scholar
[6]
Craig D. Weissman, Steve Bobrowski. the design of the force. com multitenant internet application development platform[C], SIGMOD,Rhode Island, USA, 2009, 6, 29: 889-896.
Google Scholar
[7]
Haidong Chen. Human Resource Management System for SaaS[D], Shanghai Jiao Tong University, (2006).
Google Scholar
[8]
Jun Tang. management software for small and medium-sized firm based on SaaS[D], [Master Thesis], Xiamen University, (2008).
Google Scholar
[9]
Neils Provos, Dean McNamee, Panayioitis Mavrommatis, et al. the Ghost in the browser analysis of web-based Malware[C]. HotBots, Cambridge, USA, 2007, 4, 10, USENIX: 4-13.
Google Scholar
[10]
Jing Xu, Mao Guang-can, Tang Jing-lei. Dual-code and dual-tunnel system scheme[J]. Computer Engineering and Design, 2007, 28(15): 3764-3766.
Google Scholar
[11]
BAI He, TANG Dibin, WANG Jinlin. Research and Implementation of Distributed and Multi-topic Web Crawler System[J]. Computer Engineering, 2009, 35(19): 13-16-19.
Google Scholar
[12]
libcurl-tutorial - libcurl programming tutorial. http: /curl. haxx. se/ libcurl /c/libcurl-tutorial. html, 2009, 11, 8.
Google Scholar
[13]
State and Notifications Broker Functions, http: /msdn. microsoft. com/ en-us/library /bb154495. aspx, 2009, 11, 8.
Google Scholar
[14]
Heng Yin, Zhenkai Liang, Dawn Song. HookFinder: Identifying and Understanding Malware Hooking Behaviors[C]. NDSS, San Diego, USA, 2008, 2, 11: 1-16.
Google Scholar
[15]
PANG Li-hui. Research and Implementation of Dynamically Packing Technology for PE Files[J]. Computer Engineering, 2008, 34(19): 160-166.
Google Scholar
[16]
M. Zubair Shafiq, S. Momina Tabish, Muddassar Farooq. PE-Probe: Leveraging Packer Detection and Structural Information to Detect Malicious Portable Executables[C]. VB, Crowne Plaza Geneva, Switzerland, 2009, 9, 23: 5-10.
DOI: 10.1007/978-3-642-04342-0_7
Google Scholar
[17]
Interprocess Communications. http: /msdn. microsoft. com/en-us/ library /aa365574(VS. 85). aspx, 2009, 11, 8.
Google Scholar