Author:
Yusop Zulkefli Mohd,Abawajy Jemal
Reference20 articles.
1. Richardson, R., (2008) “CSI computer crime and security survey,” Computer Security Institute, 1, 1-30.
2. Peters, S. (2009) CSI Computer Crime and Security Survey: Computer Security Institute.
3. Buyya, R., Yeo, C.S., Venugopal, S., Broberg, J., and Brandic, I., (2009). “Cloud computing and emerging IT platforms: vision, hype, and reality for delivering computing as the 5th utility,” Future Generation computer systems, 25, 599-616.
4. Onwubiko, C., (2010). “Security issues to cloud computing,” in Cloud Computing, N. Antonopoulos and L. Gillam, Eds., ed: Springer London, 271-288.
5. Kui, R., Cong, W., and Qian,W., (2012). “Security challenges for the public cloud,” Internet Computing, IEEE, 16, 69-73.
Cited by
15 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献