作者: Steven Y. Ko , Kyungho Jeon , Ramsés Morales
关键词: Cloud computing 、 Computer science 、 Computer security 、 Execution model 、 Confidentiality
摘要: … We illustrate this with an example called CloudBurst [18], a … CloudBurst’s input consists of (potentially) private data called … a private cloud gives more computing power, which can lead to …