Mell P.Grance T.The NIST definition of cloud computing[J].National Institute of Standards and technology, 2009, 53(6):50.
[2]
Vene T,Velte A,Elsenpeter R.CIoud computing,a practial approach[M]. NewYork: McGraw-Hill, Inc. ,2009.
[3]
Luo Sen-lin.Information System Security and Countermeasures[M].Beijing:Beijing Institue of Technology Press,2005.
[4]
王伟,高能,江丽娜,云计算安全需求分析研究[J].信息网络安全,2012,10(8):75-78.
[5]
冯登国,张敏,张妍,等.云计算安全研究[J].软件学报,2011,22(1):71—83.
[6]
ENGLAND P, LAMPSON B, MANFERDELL J,et al.A Trusted open platform[J]. IEEE Computer, 2003, 36(7): 55-62.
[7]
Hao Z, Zhong S, Yu N.A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability[J]. Knowledge and Data Engineering, IEEE transactions on 2011, 23(9): 1432-1437.