共 50 条
- [1] Survey on access control model in cloud computing environment [J]. 2013 INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND BIG DATA (CLOUDCOM-ASIA), 2013, : 340 - 345
- [2] System security model based on trusted access control under cloud computing environment [J]. Wang, Fengqi (fengqiwang@21cn.com), 1600, Inderscience Publishers, 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland (10): : 236 - 242
- [3] Profile Based Access Control Model in Cloud Computing Environment [J]. 2014 INTERNATIONAL CONFERENCE ON GREEN COMPUTING COMMUNICATION AND ELECTRICAL ENGINEERING (ICGCCEE), 2014,
- [4] Research on the resource monitoring model under cloud computing environment [J]. Lect. Notes Comput. Sci., M4D (111-118):
- [5] Research on the Resource Monitoring Model Under Cloud Computing Environment [J]. WEB INFORMATION SYSTEMS AND MINING, 2010, 6318 : 111 - +
- [6] A Model of Illegal Access Detection System Under Cloud Environment [J]. MATERIAL SCIENCE, CIVIL ENGINEERING AND ARCHITECTURE SCIENCE, MECHANICAL ENGINEERING AND MANUFACTURING TECHNOLOGY II, 2014, 651-653 : 1761 - 1766
- [8] Electronic Commerce Personalized Recommendation Model under Cloud Computing Environment [J]. APPLIED SCIENCE, MATERIALS SCIENCE AND INFORMATION TECHNOLOGIES IN INDUSTRY, 2014, 513-517 : 639 - 642
- [9] Data Model for Cloud Computing Environment [J]. E-INFRASTRUCTURE AND E-SERVICES FOR DEVELOPING COUNTRIES, AFRICOMM 2018, 2019, 275 : 199 - 215
- [10] A Trust Model for Cloud Computing environment [J]. PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON CLOUD SECURITY AND MANAGEMENT (ICCSM-2015), 2015, : 1 - 15