[1]
Trusted Computing, From Wikipedia. http: /en. wikipedia. org/wiki/Trusted_computing 2013-10-6.
Google Scholar
[2]
Trusted Computing Group. http: /www. trustedcomputinggroup. org/ 2013-10-6.
Google Scholar
[3]
Zhang Huanguo, Zhao Bo. Trusted Computing [M]. WuHan University Press. 2011. 8. (in Chinese).
Google Scholar
[4]
Feng DengGuo, Zhang Min, Zhang Yan, Xu Zhen. Study on cloud computing security [J]. Journal of Software, 2011 22 (1) 71- 83. (in Chinese).
Google Scholar
[5]
Yu Nenghai, HAO Zhuo, Xu Jiajia, Zhang Weiming, Zhang Chi. Review of Cloud Computing Security [J]. ACTA ELECTRONICA SINICA, 2013 41(2) 371-381. (in Chinese).
Google Scholar
[6]
S. Subashini and V. Kavitha, A survey on security issues in service delivery models of cloud computing, Journal of Network and Computer Applications, 2011 34(1), 1-11.
DOI: 10.1016/j.jnca.2010.07.006
Google Scholar
[7]
T. Noor and Q. Sheng, Trust as a service: A framework for trust management in cloud environments, in Web Information System Engineering WISE 2011, ser. Lecture Notes in Computer Science, A. Bouguettaya, M. Hauswirth, and L. Liu, Eds. Springer Berlin/Heidelberg, 2011, vol. 6997, 314–321.
DOI: 10.1007/978-3-642-24434-6_27
Google Scholar
[8]
Monoj Kumar Muchahari and Smriti Kumar Sinha, A New Trust Management Architecture for Cloud Computing Environment, 2012 International Symposium on Cloud and Services Computing (ISCOS) 2012 136-140.
DOI: 10.1109/iscos.2012.30
Google Scholar
[9]
Imad M. Abbadi, A framework for establishing trust in Cloud provenance, In International Journal of Information Security. 2012 (11) 1-18.
Google Scholar
[10]
Imad M. Abbadi and Anbang Ruan, Towards Trustworthy Resource Scheduling in Clouds, In IEEE Transactions on Information Forensics & Security, 2013 (6) 8 973-984.
DOI: 10.1109/tifs.2013.2248726
Google Scholar
[11]
Openstack-security. http: /www. openstack. org/projects/openstack-security/, 2013-10-6.
Google Scholar
[12]
Amazon Web Services. http: /aws. amazon. com/cn/, 2013-10-6.
Google Scholar
[13]
Windows Azure. http: /www. windowsazure. com/zh-cn/#, 2013-10-6.
Google Scholar
[14]
AWS Cloud Computing Whitepapers: Overview of Security Processes, http: /aws. amazon. com/cn/whitepapers/ March 2013, 2013-10-6.
Google Scholar