共 45 条
[21]
Wu J., Ping L., Ge X., Et al., Cloud storage as th infrastructure of cloud computing, International Conference on Intelligent Computing and Cognitive Informatics, pp. 380-383, (2010)
[22]
Popa R.A., Lorch J.R., Molnar D., Et al., Enabling security in cloud storage SLAs with CloudProof, Microsoft TechReport MSR-TR-2010, 46, pp. 1-12, (2010)
[23]
Subashini S., Kavitha V., A survey on security issues in service delivery models of cloud computing, Journal of Network and Computer Applications, 34, 1, pp. 1-11, (2011)
[24]
Tang Y., Lee P.P.C., Lui J.C.S., Et al., FADE: Secure overlay cloud storage with file assured deletion, Security and Privacy in Communication Networks, 50, pp. 380-397, (2010)
[25]
Chase M., Kamara S., Structured encryption and controlled disclosure, ASIACRYPT 2010, LNCS, 6477, pp. 577-594, (2010)
[26]
Kamara S., Papamanthou C., Roeder T., CS2: A semantic cryptographic cloud storage system, Microsoft Research, Tech. Rep. MSR-TR-2011-58, (2011)
[27]
Ko R.K.L., Jagadpramana P., Mowbray M., Et al., TrustCloud: A framework for accountability and trust in cloud computing, 2011 IEEE World Congress on Services, pp. 584-588, (2011)
[28]
Liu Q., Tan C.C., Wu J., Et al., Reliable re-encryption in unreliable clouds, IEEE Global Telecommunications Conference (GLOBECOM), (2011)
[29]
Barua M., Liang X., Lu X., Et al., ESPAC: Enabling security and patient-centric access control for eHealth in cloud computing, International Journal of Security and Networks, 6, 2, pp. 67-76, (2011)
[30]
Bethencourt J., Sshai A., Waters B., Ciphertext-policy attribute-based encryption, IEEE Symposium on Security and Privacy, pp. 321-334, (2007)