1 |
Stephen E. Arnold, "The Google Legacy," infonortics, 2005
|
2 |
Sanjay Ghemawat , Howard Gobioff , Shun-Tak Leung, "The Google file system," ACM SIGOPS Operating Systems Review, Vol.37 No.5, December, 2003.
|
3 |
Who uses Hadoop, http://wiki.apache.org/hadoop/PoweredBy
|
4 |
Apache Hadoop, 2009, http://hadoop.apache.org/
|
5 |
N. Zhang, J. Jing, and P. Liu, "CLOUD SHREDDER: Removing the laptop on-road data disclosure threat in the cloud computing era," in Proc. IEEE Int. Conf. Security and Privacy Comput. Commun., pp.16-18, Changsha, China, Nov., 2011.
|
6 |
Raghu Rmakrishnan, "Sherpa: Cloud Computing of the Third Kind," Data- Intensive Computing Symposium, 2008.
|
7 |
Minsu Park, Singhoon Kang and Seungjoo Kim. "Weakness and Improvement of Cloud Shredder." THE JOURNAL OF KOREA INFORMATION AND COMMUNICATIONS SOCIETY, 38(5), pp.401-409, 2013.
과학기술학회마을
DOI
ScienceOn
|
8 |
D. Hubbard and M. Sutton, "Top threats to cloud computing," in Cloud Security Alliance, Mar., 2010.
|
9 |
Su-Hyun, In-Sik Hong, Im-Yeong Lee, "Secret Sharing based on XOR for Efficient Data Recovery in Cloud Computing Environment", CISC-S'12, 23(1), pp.49-52, 2013.
|
10 |
Su-Hyun, Im-Yeong Lee, "High-Performance Data Recovery Scheme based on RAID-5 for Distributed Storage Server in Cloud Computing", Proceedings of the conference on Korea Multimedia Society, 16(1), pp.54-57, 2013.
|
11 |
Understanding RAID-5 & I/O Processors, eslim. Jun 2003. April 2013
|