[1] |
DEBOOSERE L , VANKEIRSBILCK B , SIMOENS P ,et al. Cloud-based desktop services for thin clients[J]. IEEE Internet Computing, 2012,16(6): 60-67.
|
[2] |
ZISSIS D , LEKKAS D . Addressing cloud computing security issues[J]. Future Generation Computer Systems, 2012,28(3): 583-592.
|
[3] |
YU S , WANG C , REN K ,et al. Achieving secure,scalable,and fine-grained data access control in cloud computing[C]// Conference on Information Communications. 2010: 1-9.
|
[4] |
DESHPANDE P , SHARMA S C , KUMAR P S . Security threats in cloud computing[C]// International Conference on Computing,Communication & Automation. 2015.
|
[5] |
林闯, 苏文博, 孟坤 ,等. 云计算安全:架构、机制与模型评价[J]. 计算机学报, 2013,36(9): 1765-1784.
|
|
LIN C , SU W B , MENG K ,et al. Cloud computing security:architecture,mechanism and modeling[J]. Chinese Journal of Computers, 2013,36(9): 1765-1784.
|
[6] |
DASILVA D A , LIU L , BESSIS N ,et al. Enabling green it through building a virtual desktop infrastructure[C]// 2012 Eighth International Conference on Semantics,Knowledge and Grids (SKG). 2012: 32-38.
|
[7] |
DAWOUD W , TAKOUNA I , MEINEL C . Infrastructure as a service security:challenges and solutions[C]// 2010 the 7th International Conference on Informatics and Systems (INFOS). 2010: 1-8.
|
[8] |
JAISWAL P R , ROHANKAR A W . Infrastructure as a service:security issues in cloud computing[J]. International Journal of Computer Science and Mobile Computing, 2014,3(3): 707-711.
|
[9] |
JAISWAL P R , ROHANKAR A W . Infrastructure as a service:security issues in cloud computing[J]. International Journal of Computer Science and Mobile Computing, 2014,3(3): 707-711.
|
[10] |
项国富, 金海, 邹德清 ,等. 基于虚拟化的安全监控[J]. 软件学报, 2012,23(8): 2173-2187.
|
|
XIANG G F , JIN H , ZHOU D Q ,et al. Virtualization-based security monitoring[J]. Journal of Software, 2012,23(8): 2173-2187.
|
[11] |
HUSSEIN N H , KHALID A . A survey of cloud computing security challenges and solutions[J]. International Journal of Computer Science and Information Security, 2016,14(1): 52.
|
[12] |
王晓聪, 张冉, 黄赪东 . 渗透测试技术浅析[J]. 计算机科学, 2012,(S1): 86-88.
|
|
WANG X C , ZHANG R , HUANG C D . Penetration test techniques shallow[J]. Computer Science, 2012,(S1): 86-88.
|
[13] |
ZHANG Y , YANG L T , ZHOU Y ,et al. Information security underlying transparent computing:impacts,visions and challenges[J]. Web Intelligence & Agent Systems, 2010,8(2): 203-217.
|
[14] |
WANG G , LIU Q , XIANG Y ,et al. Security from the transparent computing aspect[C]// Networking and Communications International Conference on Computing. 2014: 216-220.
|
[15] |
AYRES J , FLANNICK J , GEHRKE J ,et al. Sequential pattern mining using a bitmap representation[C]// Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. 2002: 429-435.
|