[1] Y. Kang, “Development of Network Marketing,” Renmin University of China Press, Beijing, 2004, 147-149
[2] C. Wang, “On Network Marketing in the new situation,” Chinese Market, Vol. 29, 2013, pp. 42-43
[3] R. J. Zhang, “Discussion about enterprise e-commerce network marketing,” Enterprise Management, Vol. 9, 2013, pp. 30-31.
[4] Q. Zhang, “Apparel Consumer Behavior in E-Commerce Environment,” Electronic Design Engineering, Vol. 7, 2013, pp. 52-54
[5] Z. C. Li and M.-L. Liu, “Consumer Behavior Study under E-Commerce Environment,” China Management Science, Vol. 10, 2002, pp. 88-91
[6] Y. Wei, “Research of Consumer Behavior in Network Group Buying,” Ecommerce, Vol. 11, 2011, pp. 85-86.
[7] P. Gao, “Development Countermeasure of Network Marketing,” Business Research, Vol. 3, 2002, pp. 58-61.
[8] Z. Yang and L. Gao, “Innovative model direction of SME network marketing,” East China Economic Management, Vol. 10, 2004, pp. 73-75.
[9] W. Tao, “SME Network Marketing Situation, Problems and Countermeasures,” Marketing Strategy, Vol. 12, 2012, pp. 122-123.
[10] J. J. Zhang, “Summary of E-Commerce Joint Distribution,” Ecommerce, Vol. 9, 2013, pp. 87-90.
[11] Y. Ren, “Network Marketing Channel Under E-Commerce Mode,” Intelligence Magazine, Vol. 1, 2004, pp. 79-80.
[12] K. Sims, “IBM Introduces Ready-To-Use Cloud Computing Collaboration Services Get Clients Started with Cloud Computing,” 2007.
http://www-03.ibm.com/press/us/en/presselease/22613.wss
[13] G. Boss, P. Malladi, D. Quan, L. Legregni and H. Hall, “Cloud Computing,” IBM White Paper, 2007.
http://download.boulder.ibm.com/ibmdl/pub/software/dw/wes/hipods/
Cloud_computing_wp_final_8Oct.pdf
[14] M. Mowbray and S. Person, “A Client-Based Privacy Manager for Cloud Computing,” Proceedings of the 4th International ICST Conference on Communication System Soft Ware and Middleware, 2009, pp. 1-8.
[15] S. Pearson, “Taking Account of Privacy When Designing Cloud Computering Service,” Proceeding of the 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing, 2009, pp. 44-52.
[16] D. Bernstein and E. Ludvigson, “Networking Challenges and Resultant Approaches for Large Scale Cloud Construction,” Pervasive Computing Conference GPC, Geneva, 4-8 May 2009, pp. 136-142.
[17] D. Bernstein, E. Ludvigson, K. Sankar, et al., “Blueprint for the Intercloud-Protocols and Formats for Cloud Computing Interoperability,” Proceedings of the 2009 4th International Conference on Internet and Web Applications and Services, Venice, 24-28 May 2009, pp. 328-336.
[18] M. Matos, A. Sousa, J. Pereira, et al., “CLON: Overlay Network for Clouds,” Proceedings of the 3rd Workshop on Dependable Distributed Data Management, Nuremberg, 2009, pp. 14-17.
[19] M. Descher, P. Masser, T. Feilhauer, et al., “Retaining Data Control to the Client in Infrastructure Clouds,” International Conference on Acailibility, Reliability and Security (ARES’09), Fukuoka, 16-19 March 2009, pp. 9-6.
[20] T. Hirofuchi, H. Ogawa, H. Nakada, et al., “A Live Storage Migration Mechanisa over Wan for Relocatable Virtual Machine Services on Clouds,” Proceedings of the 2009 9th IEEE/ACM International Symposium on Cluster Computing and the Grid, Shanghai, 18-21 May 2009, pp. 460-465.
[21] L. Hu, S. Ying, X. Jia, et al., “Towards an Approach of Semantic Access Control,” Proceedings of the 1st International Conference Cloud Computing, Beijing, 1-4 December 2009, pp. 145-156.
[22] P. Liu, “Three Reference Standards for Determining Cloud Computing,” Cloud Computing, Vol. 10, 2010, pp. 58-59.
[23] P. Kotler, “Rethinking Marketing: Sustainable Marketing Enterprise in Asia,” China Renmin University Press, Beijing, 2004.