![Open access](/images/ico/o.png)
![](/images/ico/ico5.png)
Author: Kou Weili Li Hui Zhou Kailai
Publisher: MDPI
E-ISSN: 1999-5903|8|3|35-35
ISSN: 1999-5903
Source: Future Internet, Vol.8, Iss.3, 2016-07, pp. : 35-35
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content
![](/images/ico/o.png)
![](/images/ico/ico5.png)
Study on User Authority Management for Safe Data Protection in Cloud Computing Environments
Symmetry, Vol. 7, Iss. 1, 2015-03 ,pp. :
![](/images/ico/o.png)
![](/images/ico/ico5.png)
Cloud Computing Security: A Survey
By Khalil Issa M. Khreishah Abdallah Azeem Muhammad
Computers, Vol. 3, Iss. 1, 2014-02 ,pp. :
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
Red Cloud Rising:Cloud Computing in China
International Journal of Computer Research, Vol. , Iss. , 2014-10 ,pp. :
![](/images/ico/o.png)
![](/images/ico/ico5.png)
![](/images/ico/o.png)
![](/images/ico/ico5.png)
A Framework for Security Transparency in Cloud Computing
By Ismail Umar Mukhtar Islam Shareeful Ouedraogo Moussa Weippl Edgar
Future Internet, Vol. 8, Iss. 1, 2016-02 ,pp. :