Author:
Lentini Salvatore,Grosso Enrico,Masala Giovanni L.
Publisher
Springer International Publishing
Reference12 articles.
1. Velte, A., Velte, T., Elsenpeter, R.: Cloud Computing: A Practical Approach. McGraw-Hill, New York (2010)
2. Masala, G.L.C., Ruiu, P., Grosso, E.: Biometric authentication and data security in cloud computing. In: Computer and Network Security Essentials, pp. 337–355. Springer (2017)
3. Li, X., Shen, Y., Zhang, J.: The verifiable secure schemes for resisting attacks in cloud deduplication services. Inter. J. Grid Utility Comp. 7(3), 184–189 (2016)
4. Hegarty, R., Haggerty, J.: Extrusion detection of illegal files in cloud-based systems. Int. J. Space-Based Situated Comput. (IJSSC) 5(3) (2015)
5. Hababeh, I.: A novel cloud computing data fragmentation service design for distributed systems. In: 2011 International Conference on Parallel and Distributed Processing Techniques and Applications (2011)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献