

Author: Anwar Nazia Deng Huifang
Publisher: MDPI
E-ISSN: 1999-5903|10|1|5-5
ISSN: 1999-5903
Source: Future Internet, Vol.10, Iss.1, 2018-01, pp. : 5-5
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content






Study on User Authority Management for Safe Data Protection in Cloud Computing Environments
Symmetry, Vol. 7, Iss. 1, 2015-03 ,pp. :


Hard Real-Time Task Scheduling in Cloud Computing Using an Adaptive Genetic Algorithm
By Mahmood Amjad Khan Salman A.
Computers, Vol. 6, Iss. 2, 2017-04 ,pp. :


Cloud Computing Security: A Survey
By Khalil Issa M. Khreishah Abdallah Azeem Muhammad
Computers, Vol. 3, Iss. 1, 2014-02 ,pp. :