共 50 条
- [31] Security and Assurance Aspects to be Observed in Cloud Computing Based Data Centers: A Study [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2018, 12 (04): : 1 - 14
- [32] Achieving Cloud Security using Third Party Auditor, MD5 and Identity-Based Encryption [J]. 2016 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), 2016, : 1304 - 1309
- [34] Security and Privacy in Cloud Computing [J]. 2012 INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGIES, APPLICATIONS AND MANAGEMENT (ICCCTAM), 2012, : 241 - 245
- [35] Security and Privacy in Cloud Computing [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2013, 15 (02): : 843 - 859
- [36] Security and Privacy in Cloud Computing [J]. 2016 SYMPOSIUM ON COLOSSAL DATA ANALYSIS AND NETWORKING (CDAN), 2016,
- [38] An anomaly-based framework for mitigating effects of DDoS attacks using a third party auditor in cloud computing environments [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2020, 23 (04): : 2609 - 2627
- [39] An anomaly-based framework for mitigating effects of DDoS attacks using a third party auditor in cloud computing environments [J]. Cluster Computing, 2020, 23 : 2609 - 2627