共 38 条
- [1] Ateniese G., 2006, ACM Transactions on Information and Systems Security, V9, P1, DOI 10.1145/1127345.1127346
- [2] Barker E., 2016, NIST SPEC PUBL, V800, P1, DOI DOI 10.6028/NIST.SP.800-57PT1R4
- [4] Barua M., 2011, IEEE INFOCOM 2011 - IEEE Conference on Computer Communications. Workshops, P970, DOI 10.1109/INFCOMW.2011.5928953
- [5] Ciphertext-policy attribute-based encryption [J]. 2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 321 - +
- [6] Security Audits of Multi-tier Virtual Infrastructures in Public Infrastructure Clouds [J]. PROCEEDINGS OF THE 2010 ACM WORKSHOP CLOUD COMPUTING SECURITY WORKSHOP (CCSW'10:), 2010, : 93 - 102
- [7] Chase M, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P121
- [9] Chow S. S., 2016, P 21 ACM ACM S CONTR, P215, DOI DOI 10.1145/2914642.2914659
- [10] Chu CK, 2007, LECT NOTES COMPUT SC, V4779, P189