共 19 条
[1]
Ratten V., Cloud computing technology innovation advances: A set of research propositions, International Journal of Cloud Applications and Computing (IJCAC), 5, 1, pp. 69-76, (2015)
[2]
Buyya R., Christian V., Selvi S. T., Mastering cloud computing: Foundations and applications programming, (2013)
[3]
Wu W., Zhang Q., Wang Y., Public cloud security protection research, 2019 IEEE Int. Conf. on Signal Processing, Communications and Computing (ICSPCC), pp. 1-4, (2019)
[4]
Kallahalla M., Riedel E., Swaminathan R., Wang Q., Fu K., Plutus: Scalable secure file sharing on untrusted storage, 2nd USENIX Conf. on File and Storage Technologies (FAST 03), pp. 29-42, (2003)
[5]
Anderson R., Security Engineering: A Guide to Building Dependable Distributed Systems, (2020)
[6]
Bell D. E., Looking back at the bell-la padula model, 21st Annual Computer Security Applications Conf. (ACSAC'05), (2005)
[7]
Wang G., Liu Q., Wu J., Achieving fine-grained access control for secure data sharing on cloud servers, Concurrency and Computation: Practice and Experience, 23, 12, pp. 1443-1464, (2011)
[8]
Zhu H., Wang L., Ahmad H., Niu X., Key-policy attribute-based encryption with equality test in cloud computing, IEEE Access, 5, pp. 20428-20439, (2017)
[9]
Huang X., Susilo W., Mu Y., Zhang F., Short designated verifier signature scheme and its identity-based variant, 6, 1, pp. 82-93, (2008)
[10]
Sahai A., Waters B., Fuzzy identity-based encryption, Annual Int. Conf. on the Theory and Applications of Cryptographic Techniques, pp. 457-473, (2005)