2ARMBRUST M, FOX A, GRIFFITH R, et al. A view of cloud computing [J]. Commune ACM, 2010, 53(4) : 50 - 58.
3韦凯.网格环境下信任模型及其访问控制应用的研究[D].广州:华南理工大学,201i.
4ROGER C. User requirements for cloud computing architecture [C] // International Conference on Cluster, Cloud and Grid Computing. Melbourne.. IEEE, 2010: 625 - 630.
5WANG Wei, ZENG Guo-sun, TANG Da-zhong, et al. Cloud-DLS:dynamic trusted scheduling for Cloud com- puting [J]. Expert System with Applications, 2012, 39 (3) :2321 - 2329.
6MOHEMED A, JOHN G, AMANI S. Collaboration- based Cloud computing security management frame- work [C] //Proceedings of 2011 IEEE International Conference on Cloud Computing. Washington DC: IEEE, 2011: 364- 371.
7CHA M, KWAK H, RODRIGUEZ P, et al. I Tube, You Tube, everybody tubes: analyzing the world's lar- gest user generated content video system [C]// Pro- eeedings of the 7th ACM SIGCOMM Conference on Internet Measurement. San Diego: ACM, 2007:1 - 14.
8CHENG X, DALE C, LIU J. Statistics and social net- work of YouTube videos [C] // Proceedings of the 16th International Workshop on the Quality of Service. Enschede: IEEE, 2008: 229- 238.
9FOSTER I, KESSELMAN C, NICK J M, et al. The physiology of the grid: an open grid services architec ture for distributed systems integration[ EB/OL]. [2012-03-05]. http: // www. globus, org/researeh/ papers/ ogsa. pdf.