THÔNG TIN TÀI LIỆU
Thông tin cơ bản
Định dạng | |
---|---|
Số trang | 68 |
Dung lượng | 2,53 MB |
Nội dung
Ngày đăng: 25/07/2017, 21:58
Nguồn tham khảo
Tài liệu tham khảo | Loại | Chi tiết | ||||||
---|---|---|---|---|---|---|---|---|
[5] Jay Heiser, Mark Nicolett (June 2008), Assessing the Security Risks of Cloud Computing, Gartner | Sách, tạp chí |
|
||||||
[7] John W.Rittinghouse, James F.Ransome (2009), Cloud computing – Implementation, Management, and Security, CRC Press | Sách, tạp chí |
|
||||||
[8] Karen Scarfone, Murugiah Souppaya, Matt Sexton (November 2007), Guide to Storage Encryption Technologies for End User Devices, National Institute of Standards and Technology | Sách, tạp chí |
|
||||||
[12] Ramaswamy Chandramouli, Michaela Iorga, Santosh Chokhani (2013), Cryptographic Key Management Issues & Challenges in Cloud Services, 35p, National Institute of Standards and Technology, U.S. Department of Commerce | Sách, tạp chí |
|
||||||
[1] Aized Amin Soofi, M.Irfan Khan and Fazal-e-Amin , Encryption Techniques for Cloud Data Confidentiality, College of Computer Science and Information Studies | Khác | |||||||
[6] Jinpeng Wei, Xiaolan Zhang, Glenn Ammons, Managing Security of Virtual Machine Images in a Cloud Environment | Khác | |||||||
[9] Muhammad Kazim, Rahat Masood, Muhammad Awais Shibli, Securing the virtual machine images in Cloud computing | Khác | |||||||
[10] National Institute of Standards and Technology (Sept 2011), The NIST Definition of Cloud Computing | Khác | |||||||
[13] Sharmila Rajasudhan , Nallusamy R, A Study on Cryptographic Methods in Cloud Storage | Khác | |||||||
[14] Sowmya. D, II-MCA, Cryptographic Cloud Storage with Hadoop Implementation | Khác | |||||||
[16] Bruce Schneier and Doug Whiting (March 2000), A performance Comparison of the Five AES Finalists | Khác |
TÀI LIỆU CÙNG NGƯỜI DÙNG
TÀI LIỆU LIÊN QUAN