共 45 条
[1]
Mell P., Grance T., The NIST definition of cloud computing, NIST Special Publication, pp. 800-145, (2011)
[2]
Bessani A., Correia M., Quaresma B., Et al., DEPSKY: Dependable and secure storage in a cloud-of-clouds, 6th Conference on Computer Systems (EuroSys'11), pp. 31-46, (2011)
[3]
Chen Y., Sion R., On securing untrusted clouds with cryptography, 2010 ACM Workshop on Privacy in the Electronic Society (WPES 2010), pp. 109-114, (2010)
[4]
Chow S.S.M., Chu C., Huang X., Et al., Dynamic secure cloud storage with provenance, Cryptography and Security: From Theory to Applications, LNCS, 6805, pp. 442-464, (2011)
[5]
Kamara S., Lauter K., Cryptographic cloud storage, 14th International Conference on Financial Cryptography and Data Security, 6054, pp. 136-149, (2010)
[6]
Kumbhare A., Simmhan Y., Prasanna V., Designing a secure storage repository for sharing scientific databases using public clouds, Second International Workshop on Data Intensive Computing in the Clouds (DataCloud-SC'11), pp. 31-40, (2011)
[7]
Li M., Yu S., Lou W., Et al., Toward privacy-assured cloud data services with flexible search functionalities, 3rd International Workshop on Security and Privacy in Cloud Computing (SPCC 2012), (2012)
[8]
Lu Y., Tsudik G., Enhancing data privacy in the cloud, IFIP Advances in Information and Communication Technology, 358, pp. 117-132, (2011)
[9]
Patil D.H., Bhavsar R.R., Thorve A.S., Data security over cloud, IJCA Proceedings on Emerging Trends in Computer Science and Information Technology (ETCSIT2012) etcsit1001, 5, pp. 11-14, (2012)
[10]
Wang C., Cao N., Li J., Et al., Secure ranked keyword search over encrypted cloud data, IEEE 30th International Conference on Distributed Computing Systems (ICDCS), pp. 253-262, (2010)