共 50 条
- [1] Discussion on Information Security of Digital Library under the Cloud Computing [J]. 2015 2nd International Conference on Creative Education (ICCE 2015), Pt 2, 2015, 11 : 212 - 215
- [2] Information Security and Intellectual Property Protection of Digital Library under the Background of Cloud Computing [J]. PROCEEDINGS OF THE 2017 5TH INTERNATIONAL CONFERENCE ON FRONTIERS OF MANUFACTURING SCIENCE AND MEASURING TECHNOLOGY (FMSMT 2017), 2017, 130 : 386 - 389
- [3] Research of Library Information Security Based on Cloud Computing Platform [J]. PROCEEDINGS OF THE 2018 4TH INTERNATIONAL CONFERENCE ON SOCIAL SCIENCE AND HIGHER EDUCATION (ICSSHE 2018), 2018, 181 : 776 - 780
- [4] Research on Security Strategies of Digital Library Based on Cloud Computing Platform [J]. RESOURCES AND SUSTAINABLE DEVELOPMENT, PTS 1-4, 2013, 734-737 : 3171 - 3174
- [5] Computer Network Security Research under Cloud Computing Environment [J]. PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON MATERIALS ENGINEERING AND INFORMATION TECHNOLOGY APPLICATIONS, 2015, 28 : 890 - 893
- [6] The Research of Digital Forensics Technologies under Cloud Computing Environment [J]. INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2015, 8 (03): : 127 - 134
- [7] Cloud Computing and Digital Library Information Service [J]. PROCEEDINGS OF THE 2010 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND SCIENTIFIC MANAGEMENT, VOLS 1-2, 2010, : 573 - 576
- [8] Research on University Library Digital Resources Integration under the Cloud Computing [J]. PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON TEACHING AND COMPUTATIONAL SCIENCE, 2014, : 87 - 89
- [9] Research on the construction of Digital Library Virtual Environment based on the cloud computing technology [J]. PROCEEDINGS OF THE 2017 5TH INTERNATIONAL CONFERENCE ON FRONTIERS OF MANUFACTURING SCIENCE AND MEASURING TECHNOLOGY (FMSMT 2017), 2017, 130 : 77 - 80
- [10] Research on Digital Library Based on Cloud Computing [J]. PROCEEDINGS OF THE 2015 INTERNATIONAL INDUSTRIAL INFORMATICS AND COMPUTER ENGINEERING CONFERENCE, 2015, : 1465 - 1468