Author:
Wang Xiao,Zhang Jianbiao,Zhang Ai,Feng Xingwei,Zeng Zhiqiang
Reference17 articles.
1. Ding Y, Wang HM, Shi PC et al (2015) Trusted cloud service. Chin J Comput 38(1):133–149
2. Feng DG, Zhang M, Zhang Y et al (2011) Study on cloud computing security. Journal of Software 22(1):71–83
3. Kadhim QK, Yusof R, Mahdi HS et al (2018) A review study on cloud computing issues. J Phys Conf Ser 1018(1):012006 (IOP Publishing)
4. Ali M, Khau SU, Vasilakos AV (2015) Security in cloud computing: opportunities and challenges. Inf Sci 305:357–383
5. Zhang YQ, Wang XF, Liu XF et al (2016) Survey on cloud computing security. Ruan Jian Xue Bao/J Softw 27(6):1328–1348