参考文献 [1]Singh A K,Mishra D R,Ahmad F,et al.A Review of Cloud Computing Open Architecture and Its Security Issues[J].International Journal of Scientific & Tech-nology Research,2012,1(6):65-67. [2]Hu Fei,Qiu Meikang,Li Jiayin,et al.A Review of Cloud Computing:Design Challenges in Architecture and Security[J].Journal of Computing and Information Technology,2011,19(1):25-55. [3]Subashini S,Kavitha V.A Survey on Security Issues in Service Delivery Models of Cloud Computing[J].Journal of Network & Computer Applications,2011,34(1):1-11. [4]池俐英.云安全体系架构及关键技术研究[J].电脑开发与应用,2012,25(6):20-22. [5]Alzain M,Soh B,Pardede E.A New Model to Ensure Security in Cloud Computing Services[J].Journal of Service Science Research,2012,4(1):49-70. [6]Harfoushi O,Alfawwaz B,Ghatasheh N A.Data Security Issues and Challenges in Cloud Computing:A Conceptual Analysis and Review[J].Communications & Network,2014,6(1):14-21. [7]朱智强.混合云服务安全若干理论与关键技术研究[D].武汉:武汉大学,2011. [8]Forum J.Cloud Cube Model:Selecting Cloud Formations for Secure Collaboration[EB/OL].(2009-06-21).http://www.JerichoForum.org. [9]林闯,苏文博,孟坤,等.云计算安全:架构、机制与模型评价[J].计算机学报,2013,36(9):1765-1781. [10]Ahmed N,Abraham A.Modeling Cloud Computing Risk Assessment Using Machine Learning[C]//Proceedings of AISC’15.Berlin,Germany:Springer,2015:315-325. [11]林闯,汪洋,李泉林.网络安全的随机模型方法与评价技术[J].计算机学报,2005,28(12):1943-1956. [12]Subashini S,Kavitha V.A Survey on Security Issues in Service Delivery Models of Cloud Computing[J].Journal of Network and Computer Application,2011,34(1):1-11. [13]Tehrani S R,Shirazi F.Factors Influencing the Adoption of Cloud Computing by Small and Medium Size Enterprises[C]//Proceedings of International Con-ference on Human Interface & the Management of Information.New York,USA:ACM Press,2014:631-642. [14]罗军舟,金嘉晖,宋爱波,等.云计算:体系架构与关键技术[J].通信学报,2011,32(7):3-21. [15]丁鲜花,赵卫栋,俱莹,等.云计算的按需防护安全框架[J].计算机科学,2014,41(11A):284-288. 编辑索书志 |