[1] CCID. White Paper of Chinese Cloud Computing Industry Development[EB/OL]. (2011-05-09). http://www.ccidconsult ing.com/ei/lib/down/20110509154002.pdf.
[2] 林 闯, 田 源, 姚 敏. 绿色网络和绿色评价: 节能机制、模型和评价[J]. 计算机学报, 2011, 34(4): 593-612.
[3] 沈昌祥. 构建积极防御综合防范的防护体系[J]. 信息安全与通信保密, 2004, 41(5): 18-20.
[4] 张建勋, 古志民, 郑 超. 云计算研究进展综述[J]. 计算机应用研究, 2010, 27(2): 429-433.
[5] 李 乔, 郑 啸. 云计算研究现状综述[J]. 计算机科学, 2011, 38(4): 32-37.
[6] Dawoud W, Takouna I, Meinel C. Infrastructure as a Service Security: Challenges and Solutions[C]//Proc. of the 7th International Conference on Informatics and Systems. Cairo, Egypt: IEEE Press, 2010.
[7] Santos N, Gummadi K P, Rodrigues R. Towards Trusted Cloud Computing[C]//Proc. of Conference on Hot Topics in Cloud Computing. [S. l.]: ACM Press, 2009.
[8] Goldman K, Sailer R, Srinivasan D. Scalable Integrity Monitoring in Virtualized Environments[C]//Proc. of the 15th ACM Workshop on Scalable Trusted Computing. Chicago, USA: ACM Press, 2010.
[9] Schiffman J, Moyer T, Vijayakumar H, et al. Seeding Clouds with Trust Anchors[C]//Proc. of 2010 ACM Workshop on Cloud Computing Security. New York, USA: ACM Press, 2010.
[10] Du Juan, Wei Wei, Gu Xiaohui, et al. RunTest: Assuring Integrity of Dataflow Processing in Cloud Computing Infra- structures[C]//Proc. of ASIACCS’10. Beijing, China: [s. n.], 2010.
[11] Chang E, Thomson P, Dillon T, et al. The Fuzzy and Dynamic Nature of Trust[C]//Proc. of the 2nd International Conference on Trust, Privacy, and Security in Digital Business. Copenhagen, Denmark: ACM Press, 2005.
[12] Shigeo M, Ryuichi S, Masao K. A New Traitor Tracing[J]. IEICE Transactions on Fundamentals of Electronics, 2002, 85(2): 481-484.
[13] 杜红珍. 数字签名技术的若干问题研究[D]. 北京: 北京邮电大学, 2009.
编辑 任吉慧 |