共 34 条
- [11] Hasan S S., 2019, Proceedings of the Seventh International Workshop on Security in Cloud Computing-SCC, V19, P5, DOI DOI 10.1145/3327962.3331457
- [12] Hua Wang, 2010, Proceedings of the 2010 Fourth International Conference on Network and System Security (NSS 2010), P239, DOI 10.1109/NSS.2010.13
- [15] Progger: An Efficient, Tamper-Evident Kernel-Space Logger for Cloud Data Provenance Tracking [J]. 2014 IEEE 7TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD), 2014, : 881 - 889
- [16] Kudtharkar Akshatha N., 2023, 2023 INT C NETW COMM, P1
- [17] Blockchain-enabled Data Provenance in Cloud Datacenter Reengineering [J]. BSCI '19: PROCEEDINGS OF THE 2019 ACM INTERNATIONAL SYMPOSIUM ON BLOCKCHAIN AND SECURE CRITICAL INFRASTRUCTURE, 2019, : 47 - 55
- [18] Mughal A, 2020, PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICICCS 2020), P1163, DOI [10.1109/iciccs48265.2020.9120930, 10.1109/ICICCS48265.2020.9120930]
- [20] Patil Abhishekh, 2020, 2020 International Conference on Advances in Computing, Communication & Materials (ICACCM), P443, DOI 10.1109/ICACCM50413.2020.9213032