共 17 条
[1]
Singh N., Singh S., Agarwal S., An efficient approach for software protection in cloud computing, Proc. of the 4th International Conference on Communication Systems and Network Technologies, pp. 550-554, (2014)
[2]
Chiwande V.N., Tayal A.R., An approach to balance the load with security for distributed file system in cloud, Proc. of the International Conference on Electronic Systems, Signal Processing and Computing Technologies, pp. 266-270, (2014)
[3]
Hojabri M., Rao K.V., Innovation in cloud computing: Implementation of Kerberos version5 in cloud computing in order to enhance the security issues, Proc. of the International Conference on Information Communication and Embedded Systems, pp. 452-456, (2013)
[4]
Zhou M., Study of data security related to cloud computing, (2013)
[5]
Lee G., How to formally model features of network security protocols, International Journal of Security and Its Applications, 8, 1, pp. 423-432, (2014)
[6]
Comon L.H., Cortier V., How to prove security of communication protocols: A discussion on the soundness of formal models with regard to computational ones, Proc. of the 28th International Symposium on Theoretical Aspects of Computer Science, pp. 29-44, (2011)
[7]
Lei X.F., Song S.M., Liu W.B., Et al., A survey on computationally sound formal analysis of cryptographic protocols, Chinese Journal of Computers, 37, 5, pp. 993-994, (2014)
[8]
Brooks R., Husain B., Yun S.B., Et al., Security and performance evaluation of security protocols, Proc. of the 8th Annual Cyber Security and Information Intelligence Research Workshop: Federal Cyber Security R and D Program Thrusts, pp. 5-8, (2013)
[9]
Meier S., Schmidt B., Cremers C., Et al., The TAMARIN prover for the symbolic analysis of security protocols, Proc. of the 25th International Conference on Computer Aided Verification, pp. 696-701, (2013)
[10]
Meier S., Cremers C., Basin D., Efficient construction of machine-checked symbolic protocol security proofs, Journal of Computer Security, 21, 1, pp. 41-87, (2013)