Author:
Ouedraogo Moussa,Mignon Severine,Cholez Herve,Furnell Steven,Dubois Eric
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Software
Reference75 articles.
1. Anthes G: Security in the cloud. Communication of the ACM 2010, 53(11):16–18.
2. Schneier B (2009) Cloud computing. Accessed 11th February, 2014 from http://www.schneier.com/blog/archives/2009/06/cloud_computing.html
3. Horch A, Christmann C, Kett H, Falkner J, Anette Weisbecker A: Essential Elements of an SME-specific Search of Trusted Cloud Services. In Proceedings of CLOSER. Springer, Heidelberg; 2013:88–94.
4. Dorey P.G., Leite A. (2011) Commentary: Cloud computing – A security problem or solution? Information Security Technical Report, 16 (3–4), pp. 89–96, Elsevier Dorey P.G., Leite A. (2011) Commentary: Cloud computing – A security problem or solution? Information Security Technical Report, 16 (3–4), pp. 89–96, Elsevier
5. El-Gazzar RF: Cloud Computing Adoption Factors and Processes for Enterprises - A Systematic Literature Review. In Proceedings of CLOSER. Springer, Berlin; 2013:78–87.
Cited by
31 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献