Author:
Mohebbi Moghaddam Monireh,Manshaei Mohammad Hossein,Zhu Quanyan
Publisher
Springer International Publishing
Reference10 articles.
1. Bhadauria, R., Sanyal, S.: Survey on Security Issues in Cloud Computing and Associated Mitigation Techniques (2012, arXiv preprint).
arXiv:1204.0764
2. Chen, D., Zhao, H.: Data security and privacy protection issues in cloud computing. In: International Conference on Computer Science and Electronics Engineering (ICCSEE), pp. 647–651 (2012)
3. Toosi, A.N., Calheiros, R.N., Buyya, R.: Interconnected cloud computing environments: challenges, taxonomy, and survey. ACM Comput. Surv. (CSUR) 47(1), 7–53 (2014)
4. Chen, Y.R., Tian, L.Q., Yang, Y.: Model and analysis of user behavior based on dynamic game theory in cloud computing. Dianzi Xuebao Acta Electronica Sinica 39(8), 1818–1823 (2011)
5. Kamhoua, C., Kwiat, L., Kwiat, K., Park, J. S., Zhao, M., Rodriguez, M.: Game theoretic modeling of security and interdependency in a public cloud. In: IEEE 7th International Conference on Cloud Computing (CLOUD), pp. 514–521 (2014)
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献