As we know,cloud computing growing
drastically to achieve the prosperity for the
human,and with this thrive the
penetrate Malicious program in the cloud security
becomes more important. Several trends open up
the era of cloud computing,which is an internet
base development and use the computer
technology.The ever cheaper and more powerful
processors,together with the software as a service
SaaScomputing architecture,are transforming data
center into pools of computing service on a huge
scale.for instance,the Amazon Simple Storage
Service and Amazon Elastic Compute Cloud are well known examples
As we know,cloud computing growingdrastically to achieve the prosperity for thehuman,and with this thrive thepenetrate Malicious program in the cloud securitybecomes more important. Several trends open upthe era of cloud computing,which is an internetbase development and use the computertechnology.The ever cheaper and more powerfulprocessors,together with the software as a serviceSaaScomputing architecture,are transforming datacenter into pools of computing service on a hugescale.for instance,the Amazon Simple StorageService and Amazon Elastic Compute Cloud are well known examples
การแปล กรุณารอสักครู่..
