[1]
Chen Donglin, Ma Mingming, Lü Qiuyun. Cloud Service Collaboration Market Transaction Model [J]. Journal of Wuhan University of Technology(Information & Management Enginerring), 2011, 33(3): 456-459. DOI: 10. 3963/j. issn. 1007-144X. 2011. 03. 032.
Google Scholar
[2]
Dong Xiaoxia, Lü Tingjie. Review of the Cloud Computing and Its Future Development [J]. Journal of Beijing University of Pots and TelecommunicatIions(Social Science Edition), 2010, 12(5): 76-81.
Google Scholar
[3]
Rajkumar Buyya, Chee Shin Yeo, Srikumar Venugopal. Cloud computing and emerging IT platforms: Vision, hype, and reality fordelivering computing as the 5th utility[J]. Future generations computer systems, 2009, 25(6): 599-616. DOI: 10. 1053/j. gastro. 2007. 03. 107.
DOI: 10.1016/j.future.2008.12.001
Google Scholar
[4]
Zong Mei, Ma Xiaoping. Structure and Application of Three-tier Client/Server Structure Based on . Net [J]. Computer Engineering and Design, 2005, 26(2): 520-522.
Google Scholar
[5]
Fan Yinting, He Hongyun. The Research of 2-Tier and 3-Tier Structure Based on the Client/Server Architecture [J]. Application Research of Computers, 2001, 18(12): 23-24, 40.
Google Scholar
[6]
Yu Chongchong. Management Information System on Three Layers Client/Server [J]. Application Research of Computers, 2000, 17(7): 93-95.
Google Scholar
[7]
Hatton, L. Empirical Test Observations in Client-Server Systems[J]. Computer, 2007, 40(5): 24-29. DOI: 10. 1109/MC. 2007. 166.
DOI: 10.1109/mc.2007.166
Google Scholar
[8]
Iliev, A., Smith, S.W. Protecting client privacy with trusted computing at the server[J]. IEEE security & amp; privacy, 2005, 3(2): 20-28.
DOI: 10.1109/msp.2005.49
Google Scholar