共 50 条
- [21] Key Security Technologies of Cloud Computing Platforms PROCEEDINGS OF INTERNATIONAL CONFERENCE ON SOFT COMPUTING TECHNIQUES AND ENGINEERING APPLICATION, ICSCTEA 2013, 2014, 250 : 411 - 417
- [22] Key techniques of access control for cloud computing Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2015, 43 (02): : 312 - 319
- [23] Cloud Computing Implementation: Key Issues and Solutions 2015 2ND INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2015, : 320 - 324
- [24] Secured Key Escort Services in Cloud Computing INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2013, 13 (08): : 109 - 113
- [25] Key Trends in Enterprise Uptake of Cloud Computing PROCEEDINGS OF THE 2013 IEEE INTERNATIONAL CONFERENCE ON CLOUD ENGINEERING (IC2E 2013), 2013, : XIV - XIV
- [26] A parallel computing method to electromagnetic problems based on cloud computing Niu, Pingjuan (niupingjuan@tjpu.edu.cn), 1600, China Machine Press (31):
- [27] Cloud Computing Adoption by a Cloud Service Provider: Key Adoption Factors PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON IS MANAGEMENT AND EVALUATION (ICIME 2015), 2015, : 33 - 39
- [29] Research on Key Technology of Authentication and Key Negotiation in Cloud Computing Environment PROCEEDINGS OF THE 2015 3RD INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS AND INFORMATION TECHNOLOGY APPLICATIONS, 2015, 35 : 246 - 250
- [30] Key ingredients in an IoT recipe: Fog Computing, Cloud Computing, and more Fog Computing 2014 IEEE 19TH INTERNATIONAL WORKSHOP ON COMPUTER AIDED MODELING AND DESIGN OF COMMUNICATION LINKS AND NETWORKS (CAMAD), 2014, : 325 - 329