2John Rittinghouse, James Ransome. Cloud computing: implementation, management, and security[M]. USA, Florida: CRC Press, 2009.
3Clark C, Fraser K, Hand S, et al. Live migration of virtual machines[C]// Proc. of NSDI' 05. Berkeley,CA, USA, 2005: 273-286.
4Sedayao J. Implementing and operating an internet scale distributed application using service oriented architecture principles and cloud computing infrastructure [C]// ii-WAS2008. Austria, 2008:417-421.
5Paul Pocatilu, Felician Alecu, Marius Vetrici. Using cloud computing for E-learning systems[C]//Proceedings of the 8th WSEAS international conference on Recent Advances on Data Networks, Communications, Computers. UK: Cambridge, 2009.
6Nurmi D, Wolski R, Grzegorczyk C, et al. Eucalyptus a technical report on an elastic utility computing archi tecture linking your programs to useful systems[R] California, UCSB Computer Science. 2008.
7Siebenlist F. Challenges and opportunities for virtualized security in the clouds[C]//SACMAT'09: Proceedings of the 14th ACM symposium on access control models and technologies. USA, ACM, New York, 2009:1-2.
8I. Foster, C. Kesselman. The Grid : Blueprint for a New Computing Infrastructure[M]. San Fransisco : Morgan Kaufmann ,1999.
9Foster I, Kesselman C, Tsudik G, et al. A Security Architecture for Computational Grids [R]. In: Prec. of 5 ACM Conference on Computer and Communications Security Conference, 1998:83-92
10Foster I, Kesselman C , Tuecke S. The anatomy of the grid: enabling scalable virtual organizations [ EB/OL ] .http ://www.globus. org/ research/ papers/ anatomy. pdf .2002/2004201203.