|
[1]
|
|
Mell P, Grance T. The NIST Definition of Cloud Computing[DB/OL]. http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf, 2011-09-30.
|
[2] |
Dean J, Ghemawat S. MapReduce: Simplified data processing on large clusters[J]. Communications of the ACM, 2008,51(1):107-113.
|
[3] |
Ercolani G. Cloud computing services potential analysis: An integrated model for evaluating software as a service[C]// The Fourth International Conference on Cloud Computing, GRIDs, and Virtualization. 2013:77-80.
|
[4] |
Bernstein D, Ludvigson E, Sankar K, et al. Blueprint for the intercloud-protocols and formats for cloud computing interoperability[C]// 2009 Fourth International Conference on Internet and Web Applications and Services. 2009:328-336.
|
[5] |
Zhang Yu, Ren Shu Qin, Chen Shi Bin, et al. DifferCloudStor: Differentiated quality of service for cloud storage[J]. IEEE Transactions on Magnetics, 2013,49(6):2451-2458.
|
[6] |
Bruneo D, Distefano S, Longo F, et al. Workload-based software rejuvenation in cloud systems[J]. IEEE Transactions on Computers, 2013,62(6):1072-1085.
|
[7] |
张为民,等. 云计算:深刻改变未来[M]. 北京:科学出版社, 2009.
|
[8] |
Armbrust M, Fox A, Griffith R, et al. Above the Clouds: A Berkeley View of Cloud Computing[R]. EECS Department, University of California, Berkeley, Tech. Rep. UCB/EECS-2009-28, 2009.
|
[9] |
吴朱华. 云计算核心技术剖析[M]. 北京:人民邮电出版社, 2011.
|
[10] |
Ahmed S. Data Portability: Key to Cloud Portability and Interoperability[DB/OL]. http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1712565, 2010-11-11.
|
[11] |
Di Costanzo A, De Assuncao M D, Buyya R. Harnessing cloud technologies for a virtualized distributed computing infrastructure[J]. IEEE Internet Computing, 2009,13(5):24-33.
|
[12] |
Mather T, Kumaraswamy S, Latif S. Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance[M]. O’Reilly Media, Inc., 2009.
|
[13] |
Wang C, Wang Q, Ren K, et al. Ensuring data storage security in cloud computing[C]// Proceedings of the 17th International Workshop on Quality of Service. 2009.
|
[14] |
袁禄来,曾国荪,姜黎立,等. 网格环境下基于信任模型的动态级调度[J]. 计算机学报, 2006,29(7):1217-1224.
|
[15] |
刘莉平,陈志刚. 网格实体行为可信度评估模型[J]. 计算机工程与应用, 2007,43(34):29-31.
|