logo

SCIENCE CHINA Information Sciences, Volume 59, Issue 5: 050105(2016) https://doi.org/10.1007/s11432-016-5549-1

Theory and methodology of research on cloud security

More info
  • ReceivedNov 15, 2015
  • AcceptedJan 16, 2016
  • PublishedApr 8, 2016

Abstract


Funded by

National basic Research Program of China(973)

National natural Science Foundation of China(61272072)

"source" : null , "contract" : "2014CB340600"


Acknowledgment

Acknowledgments

This work was supported by National basic Research Program of China (973) (Grant No. 2014CB340600) and National natural Science Foundation of China (Grant No. 61272072).


References

[1] Tsai W T, Bai X Y, Huang Y. Sci China Inf Sci, 2014, 57: 051101 Google Scholar

[2] Dai W Q, Jin H, Zou D Q, et al. Future Gener Comput Syst, 2015, 49: 47-57 Google Scholar

[3] Dai W Q, Paul P T, Jin H, et al. IEEE Trans Depend Secure Comput (TDSC), 2012, 9: 838-851 Google Scholar

[4] Shi L, Zou D Q, Jin H. Xen Virtualization Technology (in Chinese). Wuhan: Huazhong University of Science and Technology Press, 2009. Google Scholar

[5] Jin H. The Virtualization of Computing System Principles and Applications (in Chinese). Beijing: Tsinghua University Press, 2008. Google Scholar

[6] Zou D Q, Qiang W Z, Jin H. The Principles and Application of Trusted Computing Technology (in Chinese). Beijing: Science Press, 2011. Google Scholar

[7] Chen G, Jin H, Zou D Q, et al. IEEE Trans Parallel Distrib Syst, 2016, 27: 941-950 Google Scholar

[8] Liu K, Zou D Q, Jin H. UaaS: software update as a service for the IaaS cloud. In: Proceedings of IEEE International Conference on Services Computing, Chicago, 2015. 483-490. Google Scholar

Copyright 2019 Science China Press Co., Ltd. 《中国科学》杂志社有限责任公司 版权所有

京ICP备18024590号-1