[1] VARIA J, MATHEW S. Overview of Amazon Web services[EB/OL].[2015-01-21]. http://docs.aws.amazon.com/gettingstarted/latest/awsgsg-intro/intro.html. [2] MELL P M, GRANCE T. The NIST definition of cloud computing, SP 800-145[R]. Gaithersburg, MD:National Institute of Standards & Technology, 2011. [3] MURRAY S. IDC forecasts[EB/OL].[2015-11-20]. http://www.idc.com/getdoc.jsp?containerId=prUS25797415. [4] ZISSIS D, LEKKAS D. Addressing cloud computing security issues[J]. Future Generation computer systems, 2012, 28(3):583-592. [5] 亚马逊EC2云计算服务遭到僵尸网络攻击引发故障[EB/OL].[2016-06-13]. http://www.2cto.com/News/200912/43369.html. (The EC2 of Amazon was attacked by botnet[EB/OL].[2016-06-13]. http://www.2cto.com/News/200912/43369.html.). [6] 阿里云9月1日云盾升级故障真相[EB/OL].[2015-09-11]. http://www.infoq.com/cn/news/2015/09/aliyun-yundun?isappinstalled=0. (The truth of the malfunction which is occur in Aliyun at Sep.1[EB/OL].[2015-09-11]. http://www.infoq.com/cn/news/2015/09/aliyun-yundun?isappinstalled=0.). [7] JANSEN W, GRANCE T. Guidelines on security and privacy in public cloud computing, SP 800-144[R]. Gaithersburg, MD:National Institute of Standards & Technology, 2011. [8] 阿里云安全白皮书V1.2[EB/OL].(2014-03). http://www.chinacloud.cn/show.aspx?id=15308&cid=29. (The white paper of Aliyun security system[EB/OL]. (2014-03). http://www.chinacloud.cn/show.aspx?id=15308&cid=29.). [9] The VMware NSX network virtualization platform[EB/OL]. (2015-07)[2016-03-16]. http://www.vmware.com/cn/products/nsx/. [10] ETSI. Network Functions Virtualisation (NFV); architectural framework[EB/OL].[2016-03-16]. http://www.etsi.org/deliver/etsi_gs/NFV/001_099/002/01.01.01_60/gs_NFV002v010101p.pdf. [11] ETSI. Network Functions Virtualisation (NFV); virtual network functions architecture[EB/OL].[2016-03-16]. http://www.etsi.org/deliver/etsi_gs/NFV-SWA/001_099/001/01.01.01_60/gs_nfv-swa001v010101p.pdf. [12] 王永贵,韩瑞莲.基于改进蚁群算法的云环境任务调度研究[J].计算机测量与控制,2011,19(5):1203-1204. (WANG Y G, HAN R L. Study on cloud computing task schedule strategy based on MACO algorithm[J]. Computer Measurement & Control, 2011, 19(5):1203-1204.). [13] 王祺元,闫宏印.基于改进RM算法的云环境任务调度研究[J].计算机测量与控制,2013,21(6):1612-1614. (WANG Q Y, YAN H Y. Study on cloud computing task scheduling strategy based on RM algorithm[J]. Computer Measurement & Control, 2013, 21(6):1612-1614.). [14] 金伟健,王春枝.基于匹配规则的MapReduce任务调度模型[J].计算机应用,2014,34(4):1010-1013. (JIN W J,WANG C Z. MapReduce tasks scheduling model based on matching rules[J]. Journal of Computer Applications, 2014, 34(4):1010-1013.). [15] ZAHARIA M, BORTHAKUR D, SARMA J S, et al. Job scheduling for multi-user mapreduce clusters, EECS-2009-55[R]. Berkley:University of California, EECS Department, 2009. [16] 吴吉红.基于服务质量的多租户资源调度方法研究[D].沈阳:辽宁大学, 2012:21-48. (WU J H. Multi-tenant resource scheduling method based on the quality of service[D]. Shenyang:Liaoning University, 2012:21-48.). [17] MARBACH P. Priority service and max-min fairness[J]. IEEE/ACM Transactions on Networking, 2003, 11(5):733-746. |