12010 Digital Universe Study [EB/OL]. E2010 - 7 - 27]. http://gigaom, files, wordpress, com/2010/05/2010 - digital - universe - iview_ 5 - 4 - 10. pdf.
2黄华峰,曹栗.云计算:中国未来的IT战略[M].北京:人民邮电出版社,2010.
3Armbrust M, Fox A, Grifth R, et al. Above the Clouds: A Berkeley View of Cloud Computing[ R]//Technical Report No. UCB/EECS - 2009 - 28. Berkeldy: Department of Elec-trical Engineering and Computer Sciences, University of Cali- fornia, 2009.
4Fingar P.云计算:21世纪的商业平台[M].王灵俊,译.北京:电子工业出版社,2010.
5Chaves S A, Westphall C B, Lamin F R.SLA Perspective in Security Management for Cloud Computing [ C]//Proceedings of the 6th International Conference on Networking and Ser- vices. Canctm, Mexico: IEEE,2010:201 - 217.
6Cryans Jean- Daniel,April A, Abran A. Criteria to Compare Cloud Computing with Current Database Technology[ C]//Pro- ceedings of the International Conferences on Software Process and Product Measurement. [ S.1. ] : IRF.R,200~: 114 - 126.
7Santos N, Gummadi K P, Rodrigues R. Towards trusted cloud computing [ C ]//Proceedings of HotCloud 2009. San Diego,CA,USA: [s.n. ] ,2009.
8Li Wei, Chen C X. Efficient Data Modeling and Querying Systemfor Multi--dimensional Spatial Data[ C ] //Proceed- ings of ACM GIS. Irvine, CA, USA: ACM,2008.
9Porter G, UC San Diego, La Jolla. Decouphng Storage and Computation in Hadoop with SuperDataNodes [ J ]. ACM SIGOPS Operating System Review,2010,44(2) :41 -46.
10Raj H, Nathuji R, Singh A,et al. Resource management for isolation enhanced cloud services[ C]//Proceedings of the 2009 ACM Workshop on Cloud Computing Security. New York: ACM, 2009:77- 84.