-
1
-
-
84856894029
-
Network I/O Virtualization for Cloud Computing in Plastics
-
Luo, Y.: Network I/O Virtualization for Cloud Computing in Plastics. IT Professional 12, 536-541 (2010)
-
(2010)
IT Professional
, vol.12
, pp. 536-541
-
-
Luo, Y.1
-
3
-
-
84856830315
-
-
Google, http://code.google.com/intl/zh-CH/appengine/docs/
-
-
-
-
4
-
-
84856905497
-
-
Amazon, http://docs.amazonwebservices.com/AWSEC2/lastest/ DeveloperGuide/
-
-
-
-
5
-
-
84856917600
-
-
Microsoft, http://www.microsoft.com/azure/whitepaper.mspx
-
-
-
-
6
-
-
84055170086
-
-
Publishing House of Electronic Industry, Beijing in Chinese
-
Peng, L.: Cloud Computing. Publishing House of Electronic Industry, Beijing (2010) (in Chinese)
-
(2010)
Cloud Computing
-
-
Peng, L.1
-
8
-
-
77952181552
-
Cloud Computing Research and Development Trend
-
IEEE Computer Society, Piscataway
-
Shuai, Z.: Cloud Computing Research and Development Trend. In: 2010 Second International Conference on Future Networks, pp. 93-97. IEEE Computer Society, Piscataway (2010)
-
(2010)
2010 Second International Conference on Future Networks
, pp. 93-97
-
-
Shuai, Z.1
-
9
-
-
77952169633
-
Analysis and Research of Cloud Computing System Instance
-
IEEE Computer Society, Piscataway
-
Shufen, Z.: Analysis and Research of Cloud Computing System Instance. In: 2010 Second International Conference on Future Networks, pp. 88-92. IEEE Computer Society, Piscataway (2010)
-
(2010)
2010 Second International Conference on Future Networks
, pp. 88-92
-
-
Shufen, Z.1
-
10
-
-
84856830316
-
The research of security mechanism in the cloud computing platform based on virtualization technology
-
Xue, J.: The research of security mechanism in the cloud computing platform based on virtualization technology, Master's degree paper, vol. 2 (2010)
-
(2010)
Master's Degree Paper
, vol.2
-
-
Xue, J.1
-
13
-
-
79951999348
-
Study on Cloud Computing Security
-
(in Chinese)
-
Feng, D.: Study on Cloud Computing Security. Journal of Software 1, 71-83 (2011) (in Chinese)
-
(2011)
Journal of Software
, vol.1
, pp. 71-83
-
-
Feng, D.1
-
14
-
-
84856917602
-
-
Communication World Web, http://www.cww.net.cn/cwwservice/
-
-
-
-
15
-
-
84881417498
-
Deploying virtual machines as sandboxes for the grid
-
Sriya, S., Pradheep, E., Andrea, A., Miron, L.: Deploying virtual machines as sandboxes for the grid. In: Second Workshop on Real, Large Distributed Systems, pp. 7-12 (2005)
-
(2005)
Second Workshop on Real, Large Distributed Systems
, pp. 7-12
-
-
Sriya, S.1
Pradheep, E.2
Andrea, A.3
Miron, L.4
-
16
-
-
74049131554
-
Resource management for isolation enhanced cloud services
-
Sion, R. (ed.) Association for Computing Machinery, New York
-
Raj, H., Nathuji, R., Singh, A., England, P.: Resource management for isolation enhanced cloud services. In: Sion, R. (ed.) Proc. of the 2009 ACM Workshop on Cloud Computing Security, CCSW 2009, Co-Located with the 16th ACM Computer and Communications Security Conf., CCS 2009, pp. 77-84. Association for Computing Machinery, New York (2009)
-
(2009)
Proc. of the 2009 ACM Workshop on Cloud Computing Security, CCSW 2009, Co-Located with the 16th ACM Computer and Communications Security Conf., CCS 2009
, pp. 77-84
-
-
Raj, H.1
Nathuji, R.2
Singh, A.3
England, P.4
-
17
-
-
74049145625
-
Managing security of virtual machine images in a cloud environment
-
Sion, R. (ed.) Association for Computing Machinery, New York
-
Wei, J., Zhang, X., Ammons, G., Bala, V., Ning, P.: Managing security of virtual machine images in a cloud environment. In: Sion, R. (ed.) Proc. of the 2009 ACM Workshop on Cloud Computing Security, CCSW 2009, Co-Located with the 16th ACM Computer and Communications Security Conf., CCS 2009, pp. 91-96. Association for Computing Machinery, New York (2009)
-
(2009)
Proc. of the 2009 ACM Workshop on Cloud Computing Security, CCSW 2009, Co-Located with the 16th ACM Computer and Communications Security Conf., CCS 2009
, pp. 91-96
-
-
Wei, J.1
Zhang, X.2
Ammons, G.3
Bala, V.4
Ning, P.5
|