共 50 条
- [1] Defending of Trusted Access Control in Cloud Computing INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2014, 7 (03): : 163 - 166
- [2] Cloud Key Management using Trusted Execution Environment SECRYPT 2021: PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2021, : 560 - 567
- [3] Comparing the Efficiency of Key Management Hierarchies for Access Control in Cloud SECURITY IN COMPUTING AND COMMUNICATIONS (SSCC 2015), 2015, 536 : 36 - 44
- [4] A Way of Key Management in Cloud Storage Based on Trusted Computing NETWORK AND PARALLEL COMPUTING, 2011, 6985 : 135 - 145
- [6] Access Control Management for Cloud 2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 485 - 492
- [7] Trusted and Reputed Services using Enhanced Mutual Trusted and Reputed Access Control Algorithm in Cloud 2ND INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING, COMMUNICATION & CONVERGENCE, ICCC 2016, 2016, 92 : 506 - 512
- [8] Research of key management based on trusted module for cloud storage user Sichuan Daxue Xuebao (Gongcheng Kexue Ban)/Journal of Sichuan University (Engineering Science Edition), 2014, 46 (06): : 25 - 31
- [9] Trusted Access Control Model Based on Role and Task in Cloud Computing 2015 7TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY IN MEDICINE AND EDUCATION (ITME), 2015, : 710 - 713
- [10] Key techniques of access control for cloud computing Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2015, 43 (02): : 312 - 319