لیست زیر مراجع و منابع استفاده شده در این مقاله را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود مقاله لینک شده اند :
Jagyasi, T., and Pimple, A., "JSecurity Enhancement in Cloud Computing ...
Damshenas, M., "Forensics investigation challenges in cloud computing environments, " ...
Marston, S., "Cloud computing the business perspective, " Decision Support ...
Zhou, M., Zhang, R., Xie, W., Qian, W., and Zhou, ...
National Institute of Standards and Technology. The NIST definition of ...
Wang, L., Laszewski, G. V., Younge, _ and He, X., ...
Sriram, I., and Khaj eh-hosseini, A., "Research Agenda in Cloud ...
Vitaly, K, and Vladimir, O., "Semantic retrieval an approach to ...
Mell, p., and Grance, T., "Effectively and securely using the ...
Zamani, A., and Mard, M. J., "Providing a secure way ...
Chungman, S., _ _ Imp lementation of Cloud Computing Environment ...
Ercan, T., "Effective use of cloud computing in educational institutions, ...
Ghazizadeh, A., "Cloud Computing Benefits and Architecture in E-Learning, " ...
Fang, Z., "Cloud Service Platform - Hospital Information Exchange (HIX) ...
Mason, S., and George, E., "Digital evidence and cloud computing, ...
Zissis, D., and Lekkas, D., "Securing e-Governmet and e-Voting with ...
Aun, M. T., "Cloud enabled spam filtering services: Challenges and ...
Joshi, K. R., "Dependability i the cloud Challenges and opportunities, ...
Schubert, L., _ Future of Cloud Computing, " Analysis, pp.213-216, ...
Joshi, K. R., Bunker, G., Jahanian, F., Moorsel, A. V., ...
Almond, C., "A Practical Guide to Cloud Computing Security", pp.787791, ...
Sanka, S., Hota, C., and Rajarajan, M., Secure Data Access ...
Sachdev, A., and Bhansali, M., "Enhancing Cloud Computing Security using ...
Tomassini, M., Sipper, M., Zolla, M., and Perrenoud, M., "Generating ...
نمایش کامل مراجع