Author:
Sharma Ritesh,Gourisaria Mahendra Kumar,Patra S. S.
Reference34 articles.
1. Basu S, Bardhan A, Gupta K, Saha P, Pal M, Bose M, Basu K, Chaudhury S, Sarkar P (2018) Cloud computing security challenges & solutions-A survey, pp 347–356.
https://doi.org/10.1109/ccwc.2018.8301700
2. Gourisaria MK, Patra SS, Khilar PM (2016) Minimizing energy consumption by task consolidation in cloud centers with optimized resource utilization. Int J Electr Comput Eng 6(6):3283
3. Holloway I, Todres L (2003) The status of method: Flexibility, consistency and coherence. Qual Res 3(3):345–357
4. Gul I, ur Rehman A, Islam MH (2011) Cloud computing security auditing. In: Proceedings of the 2011 the 2nd international conference on next generation information technology (ICNIT). Gyeongju, Korea, pp 143–148
5. Chen Z, Yoon J (2010) IT auditing to assure a secure cloud computing. In: Proceedings of the 2010 6th world congress on services (SERVICES-1). Miami, FL, USA, pp 253–259
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献