共 21 条
[1]
Zhang H., Huang T., Liu S.-Y., Wang L.-N., A privacy-preserving bucket partition mechanism in cloud, Chinese Journal of Computers, 39, 2, pp. 429-440, (2016)
[2]
Kauthale K., Sunil-D-Rathod, Vertically partitioning of database for secured data release, International Journal of Computer Applications, 117, 21, pp. 1-5, (2015)
[3]
Mohammed N., Alhadidi D., Benjamin C.-M.-F., Debbabi M., Secure two-party differentially private data release for vertically partitioned data, IEEE Transactions on Dependable and Secure Computing, 11, 1, pp. 59-71, (2014)
[4]
Wang L.-X., Liu L.-F., Liu S.-L., Et al., A secured distributed and data fragmentation model for cloud storage, Proceedings of the 2013 International Conference on Precision Mechanical Instruments and Measurement Technology, pp. 2693-2699, (2013)
[5]
Li L., Li Q.-Z., Shi Y.-L., Zhang K., SAPS-A single attribute protection scheme for SaaS, Information, 15, 1, pp. 275-282, (2012)
[6]
Zhang K., Li Q.-Z., Shi Y.-L., Research on data combination privacy preservation mechanism for SaaS, Chinese Journal of Computers, 33, 11, pp. 2044-2054, (2010)
[7]
Shao Y.-L., Shi Y.-L., A novel cloud data fragmentation cluster-based privacy preserving mechanism, IJGDC: International Journal of Grid and Distributed Computing, 7, 4, pp. 21-32, (2014)
[8]
Zhang K., Abraham A., Shi Y.-L., Data combination privacy preservation adjusting mechanism for software as a service, Proceedings of the 2013 IEEE International Conference on Systems, Man, and Cybernetics, pp. 2007-2012, (2013)
[9]
Saroj S.-K., Chauhan S.-K., Sharma A.-K., Vats S., Threshold cryptography based data security in cloud computing, Proceedings of the 2015 IEEE International Conferenceon Computational Intelligence & Communication Technology, pp. 202-207, (2015)
[10]
Xiong J.-B., Li F.-H., Ma J.-F., Liu X.-M., A full lifecycle privacy protection scheme for sensitive data in cloud computing, Peer-to-Peer Networking and Applications, 8, 6, pp. 1-13, (2014)

