Have a personal or library account? Click to login
A Mobile Terminal Security Strategy Based On the Cloud Storage Cover
By: Wang Hui and  Tang Junyong  
Open Access
|Apr 2018

References

  1. [1] IDZIOREK J, TANNIAN M, JACOBSON D. Attribution of Fraudulent Resource Consumption in the Cloud [J]. 2012 IEEE Fifth International Conference on Cloud Computing, 2012:99-106.
  2. [2] TSAI T, THEERA -AMPORNPUNT N, BAGCHI S. A study of soft error consequences in hard disk drives [J].IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2012), 2012:1-8.10.1109/DSN.2012.6263936
  3. [3] Schmuck F B, Haskin R L.GPFS: A shared-disk file system for large computing clusters[C]//Proceedings of the Conference on File and Storage Technologies, January 28-30, 2002:231-244.
  4. [4] Namjoshi J, Gupte A. Service oriented architecture for cloud based travel reservation software as a service[C]// Proceedingsof the 2009 IEEE International Conference on Cloud Computing(CLOUD’ 09), Bangalore, India, Sep 21-25, 2009.Los Alamitos, CA, USA: IEEE Computer Society, 2009:147-150.10.1109/CLOUD.2009.77
  5. [5] Goth G. Virtualization: Old technology offers huge new potential [J].IEEE Distributed Systems Online, 2007,8(2).10.1109/MDSO.2007.10
  6. [6] BOWERS K D, JUELS A, OPREA A. Proofs of retrievability : theory and implementation [J]. Proceedings of the 2009 ACM workshop on Cloud computing security (CCSW^ 09), 2009:43.10.1145/1655008.1655015
  7. [7] ARMBRUST M, STOICA I, ZAHARIA M, et al. A view of cloud computing [C]. Communications of the ACM , 2010, 53(4):50.10.1145/1721654.1721672
  8. [8] MELL P, GRANCE T. NIST Special Publication 800 -145:The NIST Definition of Cloud Computing [J]. National Institute of Standards and Technology, 2011.10.6028/NIST.SP.800-145
  9. [9] KARAME G O, CAPKUN S, MAURER U. Privacy -preserving outsourcing of brute-force key searches[J]. Proceedings of the 3rd ACM workshop on Cloud computing security workshop (CCSW^ 11): 2011:101.10.1145/2046660.2046681
  10. [10] SCHIFFMAN J, MOYER T, VIJAYAKUMAR H, et al. Seeding clouds with trust anchors [J]. Proceedings of the2010 ACM workshop on Cloud computing security workshop (CCSW’ 10), 2010: 4310.1145/1866835.1866843
Language: English
Page range: 46 - 59
Published on: Apr 8, 2018
Published by: Xi’an Technological University
In partnership with: Paradigm Publishing Services
Publication frequency: 4 issues per year

© 2018 Wang Hui, Tang Junyong, published by Xi’an Technological University
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.