Research on Information Security in Cloud Computing Environment
Abstract
Keywords
Full Text:
PDFReferences
Zhao L, Qiu X. Cloud computing environment security threats and protection. China Computer Federation Newsletter, 2010,6 (5): 47-50.
Liu W, Meng X, Ling Y. A graph-based approach for web database sampling. Journal of Software, 2008, 16(2):179-193.
Gao M, Jin C, Wang X, Tian X, Zhou A. A survey on management of data provenance. Chinese Journal of Computers, 2010, 33(3):373-389.
Zhang Y, Chen C, Bo P, et al. Cloud computing security critical technical analysis. Telecommunications Science, 2010(9): 64-69.
Nathuji R, Schwan K. VirtualPower: coordinated power management in virtualized enterprise systems. SOSP '07. New York, NY, USA: ACM, 2007.265-278.
Pallipadi V, Starikovskiy A. The ondemand governor: past, present and future. Proceedings of Linux Symposium. 2006.223-238.
Rao L, Liu X, Le X, et al. Minimizing electricity cost: optimization of distributed internet data centers in a multi-electricity-market environment. INFOCOM'10. San Diego, California, USA: IEEE Press, 2010.1145-1153.
Samadiani E, Joshi Y, Mistree F. The thermal design of a next generation data center: a conceptual exposition. 2007.93-102.
Cheng X, Guo J, Jin X. A retrospective of web information retrieval and mining. Journal of Chinese Information Processing, 2011,26 (6) :111-117.
Shen H, Jin X, Ren F, Cheng X. Public opinion analysis for social media. China Computer Federation Newsletter, 2012, 8(4):32-36.
DOI: https://doi.org/10.18686/esta.v3i1.27
Refbacks
- There are currently no refbacks.
Copyright (c) 2016 Quanhui Ren & Hui Gao
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.