共 55 条
- [1] Multi-authority ciphertext-policy attribute-based encryption with accountability. J.Li,Q.Huang,X.Chen,et al. Proceedings of the 6th ACM Symposium on Information,Computer and Communications Security . 2011
- [2] Computing in the clouds[J] . Aaron Weiss.  netWorker . 2007 (4)
- [4] Cloud Computing: Will Commodity Services Benefit Users Long Term?[J] . Miller, H Gilbert,Veiga, John.  IT Professional Magazine . 2009 (6)
- [5] Fuzzy identity based encryption. SAHAI A,WATERS B. Lecture Notes in Computer Science . 2005
- [8] Dynamic credentials and ciphertext delegation for attribute-based encryption. Sahai A,Seyalioglu H,Waters B. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) . 2012
- [9] Fully secure functional encryption with general relations from the decisional linear assumption. Okamoto T,Takashima K. Lecture Notes in Computer Science (including subseriesLecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) . 2010
- [10] Ensuring Data Storage Security in Cloud Computing. Wang C,Wang Q,Ren K, et al. 2009 17th International Workshop on Quality of Service . 2009