共 24 条
- [1] Tu S., Huang Y., Towards efficient and secure access control system for mobile cloud computing, China Communications, 12, 12, pp. 43-52, (2015)
- [2] Tu S., Niu S., Li H., A fine-grained access control and revocation scheme on clouds, Concurrency & Computation Practice & Experience, 28, pp. 1697-1714, (2016)
- [3] Niu S., Tu S., Huang Y., An Effective and Secure Access Control System Scheme in the Cloud, Chinese Journal of Electronics, 24, 3, pp. 524-528, (2015)
- [4] Ko R.K.L., Et al., TrustCloud: A Framework for Accountability and Trust in Cloud Computing, 2011 IEEE World Congress on Services, pp. 584-588, (2011)
- [5] Ko R.K.L., Kirchberg M., Lee B.S., From System-centric to Data-centric logging-Accountability, Trust and Security in Cloud Computing, In Defence Science Research Conference and Expo, (2011)
- [6] Ko R.K.L., Jagadpramana P., Lee B.S., Flogger: A File-Centric Logger for Monitoring File Access and Transfers within Cloud Computing Environments, International Conference on Trust, Security and Privacy in Computing and Communications, pp. 765-771, (2011)
- [7] Suen C.H., Ko R.K.L., Tan Y.S., Jagadpramana P., Lee B.S., S2Logger: End-to-End Data Tracking Mechanism for Cloud Data Provenance, IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Melbourne, VIC, pp. 594-602, (2013)
- [8] Fu Z., Ren K., Shu J., Sun X., Huang F., Enabling Personalized Search over Encrypted Outsourced Data with Efficiency Improvement, IEEE Transactions on Parallel and Distributed Systems, 27, 9, pp. 2546-2559, (2016)
- [9] Fu Z., Sun X., Liu Q., Zhou L., Shu J., Achieving Efficient Cloud Search Services-Multi-Keyword Ranked Search over Encrypted Cloud Data Supporting Parallel Computing, IEICE Transactions on Communications, E98.B, 1, pp. 190-200, (2015)
- [10] Xia Z., Wang X., Sun X., Wang Q., A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data, IEEE Transactions on Parallel and Distributed Systems, 27, 2, pp. 340-352, (2016)