4Arrnbrust M, Fox A, Griffith R, et al. Abovc the elouds: A berkeley view of cloud eompuling, UCB/EECS 2009 28 [R]. Berkeley: University of California, EECS Department, 2009. 被引量:1
5Chow R, Golle P, Jakobsson M, et al. Controlling data in the cloud: Outsourcing computation without oulsourcing control [C] //Proc of the 2009 ACM Workshop on Cloud Computing Security. New York: ACM, 2009:85-90. 被引量:1
6Ristenpart T, Tromer E, Shacham H, et al. Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds [C] //Proc of the 16th ACM Conf on Computer and Communications Security. New York: ACM, 2009:199-212. 被引量:1
7Amazon Inc. Amazon Web services cuslomer agreement [EB/OL]. [2009-10-01]. http://aws, amazon. corn/agreement/# 7. 被引量:1
8Chen Haibo, Chen Jieyun, Mao Wenbo, et al. Daonity grid security from two levels of virtualization [J]. Information Security Technical Report, 2007, 12(3): 123-138. 被引量:1
9Cben X, Oarfinkel T, Lewis E, et al. Overshadow: A virtualization based approach to retrofitting protection in commodity operating systems [C] //Proc of the lath lnt Conf on Architectural Support for Programming Languages and Operating Systems. New York: ACM, 2008: 2-13. 被引量:1
10Yang J, Shin K. Using hypervisor to provide data secrecy for user applications on a per-page basis [C] //Proc of the 4th ACM SIGPLAN/SIGOPS lnt Conf on Virtual Execution Environments. New York: ACM, 2008:71-80. 被引量:1