The Security Risk Factors Mining of Cloud Computing and Coping Strategies

Jiang Rong;;Ma Zifei;Li Tong;Zhang Qiujin

PDF(1260 KB)
Journal of Modern Information ›› 2015, Vol. 35 ›› Issue (1) : 85-90. DOI: 10.3969/j.issn.1008-0821.2015.01.016
信息资源开发与利用

The Security Risk Factors Mining of Cloud Computing and Coping Strategies

    {{javascript:window.custom_author_en_index=0;}}
  • {{article.zuoZhe_EN}}
Author information +
History +

HeighLight

{{article.keyPoints_en}}

Abstract

{{article.zhaiyao_en}}

Key words

Cite this article

Download Citations
{{article.zuoZheEn_L}}. {{article.title_en}}. {{journal.qiKanMingCheng_EN}}. 2015, 35(1): 85-90 https://doi.org/10.3969/j.issn.1008-0821.2015.01.016

References

References

{{article.reference}}

Funding

RIGHTS & PERMISSIONS

{{article.copyrightStatement_en}}
{{article.copyrightLicense_en}}
PDF(1260 KB)

Accesses

Citation

Detail

Sections
Recommended

/