Author:
Gupta Megha,Ahuja Laxmi,Seth Ashish
Reference51 articles.
1. A. Jeyaraj, N. Subramanian, Recent security challenges in cloud computing. Comput. Electr. Eng. 71, 28–42 (2018)
2. P. Mell, T. Grance, SP800145,The NIST Definition of cloud computing CSRC (online) Csrc.nist.gov.https://csrc.nist.gov/publications/detail/sp/800145/final. Accessed 11 December 2018
3. Xu X (2012) From cloud computing to cloud manufacturing. Robot Comput. Integr. Manuf. 28(1), 75–86
4. D.S. Kushwaha, S.K. Pippal, A simple, adaptable and efficient heterogeneous multi-tenantdata base architecture for adhoc cloud. J. Cloud Comput. Adv. Syst. Appl. 2(1), 5 (2013)
5. B. Shi, L. Cui, B. Li, X. Liu, Z. Hao, H. Shen, Shadow monitor: an effective in-VM monitoring framework with hardware-enforced isolation, in International Symposium on Research in Attacks, Intrusions, and Defenses (Springer, Berlin, 2018), pp. 670–690
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献