logo

SCIENCE CHINA Information Sciences, Volume 59, Issue 5: 050105(2016) https://doi.org/10.1007/s11432-016-5549-1

Theory and methodology of research on cloud security

More info
  • ReceivedNov 15, 2015
  • AcceptedJan 16, 2016
  • PublishedApr 8, 2016

Abstract


Funded by

National basic Research Program of China(973)

(2014CB340600)

National natural Science Foundation of China(61272072)


Acknowledgment

Acknowledgments

This work was supported by National basic Research Program of China (973) (Grant No. 2014CB340600) and National natural Science Foundation of China (Grant No. 61272072).


References

[1] Tsai W T, Bai X Y, Huang Y. Sci China Inf Sci, 2014, 57: 051101 Google Scholar

[2] Dai W Q, Jin H, Zou D Q, et al. Future Gener Comput Syst, 2015, 49: 47-57 Google Scholar

[3] Dai W Q, Paul P T, Jin H, et al. IEEE Trans Depend Secure Comput (TDSC), 2012, 9: 838-851 Google Scholar

[4] Shi L, Zou D Q, Jin H. Xen Virtualization Technology (in Chinese). Wuhan: Huazhong University of Science and Technology Press, 2009. Google Scholar

[5] Jin H. The Virtualization of Computing System Principles and Applications (in Chinese). Beijing: Tsinghua University Press, 2008. Google Scholar

[6] Zou D Q, Qiang W Z, Jin H. The Principles and Application of Trusted Computing Technology (in Chinese). Beijing: Science Press, 2011. Google Scholar

[7] Chen G, Jin H, Zou D Q, et al. IEEE Trans Parallel Distrib Syst, 2016, 27: 941-950 Google Scholar

[8] Liu K, Zou D Q, Jin H. UaaS: software update as a service for the IaaS cloud. In: Proceedings of IEEE International Conference on Services Computing, Chicago, 2015. 483-490. Google Scholar

Copyright 2020 Science China Press Co., Ltd. 《中国科学》杂志社有限责任公司 版权所有

京ICP备18024590号-1       京公网安备11010102003388号