共 20 条
[1]
Li D., Technology of Cloud Computing Development Report [M], (2013)
[2]
Liu Q., Wang G., Wu J., An Efficient Privacy Preserving Keyword Search Scheme in Cloud Computing, Proceedings of the 2009 International Conference on Computational Science and Engineering, pp. 715-720, (2009)
[3]
Huang D., Zhang X., Kang M., Luo J., Mobicloud: Building secure cloud framework for mobile computing and communication, Proceedings of 5Th IEEE International Symposium on Service-Oriented System Engineering, (2010)
[4]
Wei H., Gui X., Cloud environment supports privacy protection computable encryption methods, Journal of Computers, 34, pp. 2391-2402, (2011)
[5]
Wu E., Madden S., Zhang Y., Jones E., Curino C., Relational Cloud:The Case for a Database Service, (2010)
[6]
Muntes-Mulero V., Nin J., Privacy and anonymization for very large datasets, In Proceedings of the 18Th ACM Conference on Information and Knowledge Management, pp. 2117-2118, (2009)
[7]
Feng D., Zhang M., Zhang Y., Xu Z., Cloud computing Safety Research, Journal of Software, (2011)
[8]
Yang X., Wang Y., Wang B., Data released in the privacy of sensitive attributes for multi-Protection methods, Journal of Computers, 31, 4, pp. 574-587, (2008)
[9]
Ciriam V., Di Vimercati S.D., Foresti S., Jajodia S., Paraboschi S., Samarati P., Fragmentation and Encryption to Enforce Privacy in Data Storage, ESORICS, 4734, pp. 171-186, (2007)
[10]
Ciriani V., Capitani Di Vimercati S., Foresti S., Jajodia S., Paraboschi S., Samarati P., Enforcing Confidentiality Constraints on Sensitive Databases with Lightweight Trusted Clients, Proceedings of the 23Rd Annual IFIP WG 11.3 Working Conference on Data and Applications Security XXIII, pp. 225-239, (2009)