Introduction
Author:
Yang Kan,Jia Xiaohua
Publisher
Springer New York
Reference20 articles.
1. Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R.H., Konwinski, A., Lee, G., Patterson, D.A., Rabkin, A., Stoica, I., Zaharia, M.: A view of cloud computing. Commun. ACM 53(4), 50–58 (2010) 2. Bairavasundaram, L.N., Goodson, G.R., Pasupathy, S., Schindler, J.: An analysis of latent sector errors in disk drives. In: Proceedings of the 2007 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems (SIGMETRICS’07), pp. 289–300. ACM, New York (2007) 3. Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: Proceedings of the 2007 IEEE Symposium on Security and Privacy (S &P’07), pp. 321–334. IEEE Computer Society, Los Alamitos (2007) 4. Cellan-Jones, R.: The Sidekick Cloud Disaster. BBC News, vol. 1 (2009) 5. Gouglidis, A., Mavridis, I.: On the definition of access control requirements for grid and cloud computing systems. In: Proceedings of the 3rd International ICST Conference on Networks for Grid Applications (GridNets’09), pp. 19–26. Springer, New York (2009)
|
|