共 33 条
[11]
Hasan S S., 2019, Proceedings of the Seventh International Workshop on Security in Cloud Computing-SCC, V19, P5, DOI DOI 10.1145/3327962.3331457
[12]
Hua Wang, 2010, Proceedings of the 2010 Fourth International Conference on Network and System Security (NSS 2010), P239, DOI 10.1109/NSS.2010.13
[15]
Progger: An Efficient, Tamper-Evident Kernel-Space Logger for Cloud Data Provenance Tracking
[J].
2014 IEEE 7TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD),
2014,
:881-889
[16]
Kudtharkar Akshatha N., 2023, 2023 INT C NETW COMM, P1
[17]
Blockchain-enabled Data Provenance in Cloud Datacenter Reengineering
[J].
BSCI '19: PROCEEDINGS OF THE 2019 ACM INTERNATIONAL SYMPOSIUM ON BLOCKCHAIN AND SECURE CRITICAL INFRASTRUCTURE,
2019,
:47-55
[18]
Mughal A, 2020, PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICICCS 2020), P1163, DOI [10.1109/iciccs48265.2020.9120930, 10.1109/ICICCS48265.2020.9120930]
[20]
Patil Abhishekh, 2020, 2020 International Conference on Advances in Computing, Communication & Materials (ICACCM), P443, DOI 10.1109/ICACCM50413.2020.9213032