Author:
Noor Talal H.,Sheng Quan Z.
Reference38 articles.
1. Amazon-EC2: Elastic Compute Cloud (Amazon EC2) (2011), accessed 01/04/2011, Available at:
http://aws.amazon.com/ec2
2. Amazon-S3: Amazon Simple Storage Service (Amazon - S3) (2011), accessed 29/03/2011, Available at:
http://aws.amazon.com/s3
3. Armbrust, M., Fox, A., Griffith, R., Joseph, A., Katz, R., Konwinski, A., Lee, G., Patterson, D., Rabkin, A., Stoica, I., Zaharia, M.: A View of Cloud Computing. Communications of the ACM 53(4), 50–58 (2010)
4. Aziz, B., Hamilton, G.: Detecting Man-in-the-Middle Attacks by Precise Timing. In: Proc. of the 3rd Int. Conf. on Emerging Security Information, Systems and Technologies (SECURWARE’09). Athens/Glyfada, Greece (Jun 2009)
5. Brandic, I., Dustdar, S., Anstett, T., Schumm, D., Leymann, F., Konrad, R.: Compliant Cloud Computing (C3): Architecture and Language Support for User-Driven Compliance Management in Clouds. In: Proc. of IEEE 3rd Int. Conf. on Cloud Computing (CLOUD’10). Miami, Florida, USA (Jul 2010)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献