[1]
Mell P, Grance T. The NIST Definition of Cloud Computing[DB/OL]. http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf, 2011-09-30.
[2] Dean J, Ghemawat S. MapReduce: Simplified data processing on large clusters[J]. Communications of the ACM, 2008,51(1):107-113.
[3] Ercolani G. Cloud computing services potential analysis: An integrated model for evaluating software as a service[C]// The Fourth International Conference on Cloud Computing, GRIDs, and Virtualization. 2013:77-80.
[4] Bernstein D, Ludvigson E, Sankar K, et al. Blueprint for the intercloud-protocols and formats for cloud computing interoperability[C]// 2009 Fourth International Conference on Internet and Web Applications and Services. 2009:328-336.
[5] Zhang Yu, Ren Shu Qin, Chen Shi Bin, et al. DifferCloudStor: Differentiated quality of service for cloud storage[J]. IEEE Transactions on Magnetics, 2013,49(6):2451-2458.
[6] Bruneo D, Distefano S, Longo F, et al. Workload-based software rejuvenation in cloud systems[J]. IEEE Transactions on Computers, 2013,62(6):1072-1085.
[7] 张为民,等. 云计算:深刻改变未来[M]. 北京:科学出版社, 2009.
[8] Armbrust M, Fox A, Griffith R, et al. Above the Clouds: A Berkeley View of Cloud Computing[R]. EECS Department, University of California, Berkeley, Tech. Rep. UCB/EECS-2009-28, 2009.
[9] 吴朱华. 云计算核心技术剖析[M]. 北京:人民邮电出版社, 2011.
[10]Ahmed S. Data Portability: Key to Cloud Portability and Interoperability[DB/OL]. http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1712565, 2010-11-11.
[11]Di Costanzo A, De Assuncao M D, Buyya R. Harnessing cloud technologies for a virtualized distributed computing infrastructure[J]. IEEE Internet Computing, 2009,13(5):24-33.
[12]Mather T, Kumaraswamy S, Latif S. Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance[M]. O’Reilly Media, Inc., 2009.
[13]Wang C, Wang Q, Ren K, et al. Ensuring data storage security in cloud computing[C]// Proceedings of the 17th International Workshop on Quality of Service. 2009.
[14]袁禄来,曾国荪,姜黎立,等. 网格环境下基于信任模型的动态级调度[J]. 计算机学报, 2006,29(7):1217-1224.
[15]刘莉平,陈志刚. 网格实体行为可信度评估模型[J]. 计算机工程与应用, 2007,43(34):29-31. |