1. Zhang, Y., Wen, L., & Yao, J. (2014). Cloud computing security: A survey. Journal of Internet Technology, 15(5), 785-796.

  2. Almorsy, M., Grundy, J., & Ibrahim, A. (2016). Cloud computing security: A systematic review. Journal of Systems and Software, 119, 105-128.

  3. Liu, F., Tong, W., & Mao, Z. (2015). A survey of cloud computing security challenges and solutions. Journal of Network and Computer Applications, 52, 1-10.

  4. Sood, S. K., & Enbody, R. J. (2013). Cloud computing security issues and challenges. International Journal of Computer Networks and Communications, 5(6), 13-26.

  5. Mendy, A., Ahmed, S., & Ahmed, E. (2014). Cloud computing security: Issues and challenges. International Journal of Computer Networks and Communications Security, 2(5), 174-180.

  6. Rong, C., Nguyen, S. T., & Jaatun, M. G. (2014). Beyond lightning: A survey on security challenges in cloud computing. Computers & Electrical Engineering, 40(8), 903-924.

  7. Aljawarneh, S. A., & Alhawari, S. (2016). Cloud computing security: A review. International Journal of Advanced Computer Science and Applications, 7(3), 288-295.

  8. Yang, B., & Zhang, R. (2016). Security and privacy in cloud computing: A survey. International Journal of Distributed Sensor Networks, 12(4), 1-15.

  9. Wang, Q., Ren, K., & Lou, W. (2010). Privacy-preserving public auditing for data storage security in cloud computing. In Proceedings of IEEE INFOCOM (pp. 1-9).

  10. Wang, C., Li, J., & Wang, Y. (2016). A survey on security and privacy issues in cloud computing. Journal of Network and Computer Applications, 73, 1-11

云计算安全引用10篇文献

原文地址: https://www.cveoy.top/t/topic/hcPI 著作权归作者所有。请勿转载和采集!

免费AI点我,无需注册和登录