[1]
Luis M. Vaquero, Luis Rodero-Merino and Juan Caceres, et al. A Break in the Clouds: Towards a Cloud Definition, ACM SIGCOMM Computer Communication Review, 39(1): 50-55, (2009).
DOI: 10.1145/1496091.1496100
Google Scholar
[2]
Open Cloud Manifesto. Retrieved from http: /www. opencloudmanifesto. org, (2010).
Google Scholar
[3]
Neal Leavitt. Is Cloud Computing Really Ready for Prime Time?. IEEE Computer, 2009, (1): 15-20.
DOI: 10.1109/mc.2009.20
Google Scholar
[4]
Michael Armbrust, Armando Fox and Rean Griffith, et al. Above the Clouds: A Berkeley View of Cloud Computing, (2009).
Google Scholar
[5]
CCW Research. 2009 White Paper on China Cloud Computing Development. Retrieved from http: /www. tsinghuausa. org/W0509web/id0509/yun. pdf, (2010).
Google Scholar
[6]
Kevin D. Bowers, Ari Juels, and Alina Oprea. HAIL: A High-Availability and Integrity Layer for Cloud Storage. Cryptology ePrint Archive, Report 2008/489.
DOI: 10.1145/1653662.1653686
Google Scholar
[7]
Gartner. Teleworking in the Cloud: Security Risks and Remedies, (2010).
Google Scholar
[8]
Cloud Security Alliance. Security Guidance for Critical Areas of Focus in Cloud Computing. Retrieved from http: /www. cloudsecurityalliance. org/guidance/csaguide. pdf , (2010).
Google Scholar
[9]
SUN. Introduction to Cloud Computing architecture White Paper (1st Edition), 2010. Retrieved from https: /dct. sun. com/dct/, (2010).
Google Scholar
[10]
IBM. Prospects for new security technology. Retrieved from http: /www-935. ibm. com/services/cn/gts/pdf/ibm-tendency. pdf, (2010).
Google Scholar
[11]
Clavister. Security in the Cloud Clavister White Paper. Retrieved from http: /www. clavister. com/pdf/clavister-whp-security_in_the_cloud. pdf, (2009).
Google Scholar
[12]
Elisa Bertino, Federica Paci, Rodolfo Ferrini. Privacy-preserving Digital Identity Management for Cloud Computing. Bulletin of the IEEE Computer Society Technical Committee on Data Engineering, 2009, 32(1): 21-27.
Google Scholar
[13]
Mao Wen-Bo. Cloud computing security, 2009. Retrieved from http: /blog. pconline. com. cn/article/334526. html, (2010).
Google Scholar
[14]
Nuno Santos Krishna P. Gummadi Rodrigo Rodrigues. Towards Trusted Cloud Computing Retrieved from http: /www. mpi-sws. org/~gummadi/papers/trusted_cloud. pdf, (2010).
Google Scholar
[15]
Haibo Chen. Improving the Dependability of Cloud Computing Systems, Fudan University PhD thesis, (2009).
Google Scholar
[16]
Jin Hai. Computing system virtualization: Principles and Applications, China Tsinghua University Press, (2008).
Google Scholar