1The Cloud Security Alliance.Security Guidance for Critical Areas of Focus in Cloud Computing V3.0[EB/OL].(2011-09-23)[2012-01-12].http://www.cloudsecurityalliance.org.
2SCHNEIDER F,WALSH K,SIRER E.Nexus authorization logic(NAL):Design rationale and applications[J].ACM Transaction of Information Security,2011(06):1-28.
3GUDE N,KOPONEN T.NOX:Towards an OperatingSystem for Networks[J].ACM SIGCOMM Computer Communication Review,2008(7):105-110.
4MITCHELL N,WINSBOROUGH W.Design of a Role-based Trust-management Framework[J].IEEE Security and Privacy,2011(5):114-130.
5ENGLAND P,LAMPSON B,MANFERDELLI J.A Trusted Open Platform[J].Communication of ACM,2009(6):193-206.
6SYVERSON P,MICHAEL R,GOLDSCHLAG D.Private Web Browsing[J].Journal of Computer Security,2011(5):37-48.
8Leavitt N.Is Cloud computing really ready for prime time. IEEE Computer . 2009
9Armbrust M,Fox A,Griffith R,et al.Above the Clouds:A berkeley view of cloud computing. http://www.eecs.berkeley.edu/Pubs/TechRpts/2009/EECS2009-28.html . 2009
10Bowers K D,Juels A,Oprea A.HAIL:A high-availability and integrity layer for cloud storage. Proc of the16th ACM Conf on Computer and Communications Security . 2009