共 54 条
- [1] Security in cloud computing: Opportunities and challenges [J]. INFORMATION SCIENCES, 2015, 305 : 357 - 383
- [2] [Anonymous], 2004, IFIP TC11/WG11.5 Sixth Working Conference on Integrity and Internal Control in Information Systems (IICIS), DOI [10.1007/1-4020-7901-X_1, DOI 10.1007/1-4020-7901-X_1]
- [3] Ateniese G., 2008, P 4 INT C SEC PRIV C, P1, DOI 10.1145/1460877.1460889
- [4] Ateniese G, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P598
- [5] Ateniese G, 2009, LECT NOTES COMPUT SC, V5912, P319, DOI 10.1007/978-3-642-10366-7_19
- [6] Bhadoria R., 2018, PROC CYBER SECURITY, P729
- [8] Identity-based encryption from the Weil pairing [J]. SIAM JOURNAL ON COMPUTING, 2003, 32 (03) : 586 - 615
- [9] Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2009, 25 (06): : 599 - 616
- [10] DEKA GC, 2012, P IEEE 2 INT C PAR D, P44