3Y.Neng-Hai, Z. Hao, J. Xu, W. Zhang, C. Zhang, Review of cloud computing security, Acta Electron. Sinica 41 (2),2013: 371[]381.
4K.Hashizume, D.G. Rosado, E. Femndez-Medina, E.B. Fernandez, An analysis of security issues for cloud computing, J. Internet Services Appl. 4 (1),2013: 1-13.
二级参考文献11
1王庆波,金滓,何乐,等.虚拟化与云计算[M].北京:电子工业出版社,2009.
2Buyya R,Yeo C S,Venugopal S.Market-oriented cloud computing:vision,hype,and reality for delivering IT services as computing utilities[C].10th IEEE International Conference on High Performance Computing and Communications,2008(9):25-27.
3Foster I,Zhao Y,Raicu I,et al.Cloud computing and grid computing 360-degree compared[C].Proc of Grid Computing Environments Workshop,2008:1-10.
4李严冰.虚拟化技术作为云计算的平台[R].北京:Yecsef报告,2009.
5Frank B,Nik S,Robert P,et al.Storage virualization[M].Storage Networking Industry Association,2004.
6Lawton G.Powering down the computing infrastructure[J].Computer,2007,40(2):16-19.