Author:
Amoud Mohamed,Roudiès Ounsa
Publisher
Springer International Publishing
Reference23 articles.
1. Suby, M.: Best Practice Security In a Cloud-Enabled WorldCloud. An Executive Brief Sponsored by IBM (2014)
2. Encina, O., et al.: Towards secure inter-cloud architectures. In: Proceedings of Nordic pattern conference on Pattern Languages of Programs, Sagadi Manor, Estonia (2014)
3. Cloud Computing Use Case Discussion Group. Cloud Computing UseCases V. 3.0 (2010)
4. ENISA: Cloud computing: benefits, risks and recommendations for information security (2010).
http://www.enisa.europa.eu/act/rm/files/deliverables/cloud-computingrisk-assessment
5. Oberheide, J., Veeraraghavan, K., Cooke, E., Flinn, J., Jahanian, F.: Virtualized in-cloud security services for mobile devices. In: Proceedings of the 1st Workshop on Virtualization in Mobile Computing (MobiVirt), pp. 31–35, June 2008
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献