共 77 条
[31]
Balancing privacy versus accuracy in research protocols
[J].
SCIENCE,
2015, 347 (6221)
:479-480
[32]
Trust as a facilitator in cloud computing: a survey
[J].
JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS,
2012, 1 (01)
:1-18
[33]
Secure searches in the cloud: A survey
[J].
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE,
2016, 62
:66-75
[34]
Hassan N., 2016, INT J COMPUTER SCI I, V14, P52
[35]
Hornung G, 2012, SCRIPTED, V25, P64
[36]
Privacy as a Service: Privacy-Aware Data Storage and Processing in Cloud Computing Architectures
[J].
EIGHTH IEEE INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, PROCEEDINGS,
2009,
:711-716
[37]
Jansen Wayne., 2011, NIST special publication, V800, P10
[38]
Jyothi P., 2013, International Journal of Advanced Research in Computer and Communication Engineering, V2
[39]
Kelbert Florian, 2015, Applied Cryptography and Network Security. 13th International Conference, ACNS 2015. RevisedSelected Papers: LNCS 9092, P409, DOI 10.1007/978-3-319-28166-7_20
[40]
Kelbert Florian., 2013, Proceedings of the Third ACM Conference on Data and Application Security and Privacy, CODASPY '13, P71, DOI DOI 10.1145/2435349.2435358