References: [1] Jianfeng, Dong., Lijun, Pei., Lanying, Wang (2011). Study on the classification and protection of information security in cloud computing environment. Information Network Security, 4(6), 34-36. [2] Dongshan, Liu., Yun, Zhou. (2011). Core technology and security issues in cloud computing. Computer Knowledge and Technology, 3(7), 2-5. [3] Le, Guo, Naijing, Zhang., Jingang, I. (2009). Cloud computing security framework. Information Network Security, 3(7), 89-93. [4] Wei, Fang., Wubin, Pan., Shengjun, Xue. (2012). Literature records, Cloud Computing: concepts, techniques and applications of the review. Journal of Nanjing University of Information Science and Technology (NATURAL SCIENCE EDITION), 4(4), 23- 25. [5] Jiahui, Jin., Junzhou, Luo., Aibo, Song., Oriental. (2011). Cloud Computing: Architecture and key technologies. Journal of communication, 3(7), 34-36. [6] Ping, Li. (2011). With the labor force as the core of human resources management human resources management. 2011, 5(4), 88-93. [7] Kaimin. (2008). Agricultural research institutions of human resources planning of. Agricultural Science and Technology Management, 34(4), 21-25. [8] Liangtie, Dai. (2004). Design and development of human resource management software (1). China Labor, 3(7), 1001-1005. [9] Su, Deng., Hengyong, Tang. (2004). Application of association rules mining in decision support system of university scientific research. Journal of Shenyang Normal University (NATURAL SCIENCE EDITION), 3(1), 54-58. [10] Dezhi, Chen., Ningchuan, Xiao. (2002). Empirical research on enterprise human resource planning. Journal of China University of Geosciences (SOCIAL SCIENCE EDITION), 43(3), 87-89. [11] Mingliang, Yang. (2002). Application of information technology in enterprise human resource management. Chemical Management, 3(2), 29-34. [12] Liangtie. Dai. (1996). Organizational behavior expert system development tool development and application of. System Engineering Theory and Practice, 43(11), 56-60. [13] Tao, Feng. (2012). The advantages and Strategies of. Leader Enterprise Cloud Computing Application in the informatization construction of small and medium-sized enterprises, 3(22), 14-19. [14] Aleem, Azeem., Sprott, Christopher Ryan. (2012). Let me in the cloud: analysis of the benefit and risk assessment of cloud platform. Journal of Financial Crime, 3(1), 56-60. [15] Marston, Sean., Li, Zhi., Bandyopadhyay, Subhajyoti., Zhang, Juheng., Ghalsasi, Anand. (2010). Cloud computing — The business perspective. Decision Support Systems, 3(1), 34-36. |