参考文献
[1] Brad Stone. The Everything Store: Jeff Bezos and the Age of Amazon [M]. London: Bantam Press, 2013.
[2] 杨昆.为什么AWS云计算服务是亚马逊先做出来,而不是Google?[EB/OL].2005[2018-4-15]. https://www.zhihu.com/question/20058413/answer/325838352.
[3] Steve Grand. Creation: Life and How to Make It [M]. Cambridge: Harvard University Press, 2001.
[4] Peter Mell, Timothy Grance. The NIST Definition of Cloud Computing, NIST Special Publication 800-145[S].2011[2018-2-1]. http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf.
[5] IDC. Annual Reports [EB/OL]. 2013 [2018-4-15]. https://www.idc.co.za/financial-results/2013-annual-report/.
[6] Springboard Research. China Cloud Storage Services Report [EB/OL].2010 [2018-4-15]. http://www.springboardresearch.com/NewsDetail.aspx?CID=1005.
[7] New Economics of Cloud Computing, IBM Corporate Strategy analysis of IDC data, 2009.
[8] 刘鹏.首届中国云计算大会报告:3G时代的云计算[R].2009[2018-4-15]. http://www.ciecloud.net/.
[9] Jim Gray. What Next? A Few Remaining Problems in Information Technology [R]. 1998 [2018-4-15]. http://research.microsoft.com/~gray/talks/Gray_Turning_FCRC.pdf.
[10] Gartner. Hype Cycle for Storage Technologies [EB/OL].2017 [2018-4-15]. https://www.gartner.com/technology/research/hype-cycles/.
[11] 李开复,王咏刚.人工智能[M].北京:文化发展出版社,2017:75-77.
[12] 冯朝胜,秦志光,袁丁.云数据安全存储技术[J].计算机学报,2015,38(1):150-163.
[13] Kamara S, Lauter K. Cryptographic Cloud Storage [C]. In Proceedings of the 14th International Conference on Financial Cryptography and Data Security, Berlin, Germany, 2010: 136-149.
[14] Cloud Security Alliance. The Treacherous Twelve: Cloud Computing Top Threats in 2016[EB/OL]. 2017[2018-4-15]. https://cloudsecurityalliance.org/artifacts/the-treacherous-twelve-cloud-computing-top-threats-in-2016/.
[15] 王国峰,刘川意,潘鹤中,等.云计算模式内部威胁综述[J].计算机学报,2017,40(2):296-316.
[16] Cappelli D M, Moore A P, Trzeciak R F. The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes [M]. Boston: Addison-Wesley Professional, 2012.