[1]陈康,郑纬民.云计算:系统实例与研究现状[J].软件学报,2009,20(5):1337-1348.[2]Amzon. Amazon elastic compute cloud [EB/OL]. [2011-04-15]. http://aws.amazon.com/ec2/.[3]IBM. IBM blue cloud solution [EB/OL]. [2011-05-20]. http://www-900.ibm.com/ibm/ideasfromibm/cn/cloud/solutions/index.shtml.[4]SUN. Cloud architecture introduction white paper [EB/OL]. [2011-05-13]. http://developers.sun.com.cn/blog/functionalca/resource/sun_353cloudcomputing_chinese.pdf.[5]LEMON S. Cloud computing not secure enough [EB/OL]. [2011-05-10]. http//www.Cio.corn/article/.[6]HEISER J,NICOLETT M. Assessing the security risks of cloud computing [EB/OL]. [2011-03-25]. http://www.gartner.com/DisplayDocument? id=685308.[7]冯登国,张敏,张妍,等.云计算安全研究[J].软件学报,2011,22(1):71-83.[8]SANTOS N, GUMMADI K P, RODRIGUES R. Towards trusted cloud computing [C]// HotCloud'09: Proceedings of the 2009 Conference on Hot Topics in Cloud Computing. Berkeley: USENIX Association, 2009: 1-5.[9]孙磊,戴紫珊.云计算密钥管理框架研究[J].电信科学,2010,26(9):26-30.[10]CALHEIROS R N, RANJAN R, de ROSE C A F, et al. CloudSim: A novel framework for modeling and simulation of cloud computing infrastructures and services [R]. Melbourne: University of Melbourne, 2009.