[1] |
刘晓建, 王力生, 廖新考 . 基于CP-ABE和XACML多权限安全云存储访问控制方案[J]. 计算机科学, 2016,43(3): 118-121.
|
|
LIU X J , WANG L S , LIAO X K . Multiple permissions secure access control scheme combining CP-ABE and XACML in cloud storage[J]. Computer Science, 2016,43(3): 118-121.
|
[2] |
吴吉义, 李文娟, 黄剑平 ,等. 移动互联网研究综述[J]. 中国科学:信息科学, 2015,45(1): 45-69.
|
|
WU J Y , LI W J , HUANG J P ,et al. Key techniques for mobile Internet:a survey[J]. Scientia Sinica Informationis, 2015,45(1): 45-69.
|
[3] |
牛德华, 马建峰, 马卓 ,等. 基于属性的安全增强云存储访问控制方案[J]. 通信学报, 2013,34(S1): 276-284.
|
|
NIU D H , MA J F , MA Z ,et al. Enhanced cloud storage access control scheme based on attrib-ute[J]. Journal on Communications, 2013,34(S1): 276-284.
|
[4] |
余江, 万劲波, 张越 . 推动中国云计算技术与产业创新发展的战略思考[J]. 中国科学院院刊, 2015,30(2): 181-186.
|
|
YU J , WAN J B , ZHANG Y . Strategy of promoting innovation in China’s cloud computing industry[J]. Bulletin of Chinese Academy of Sciences, 2015,30(2): 181-186.
|
[5] |
刘帆, 杨明 . 一种用于云存储的密文策略属性基加密方案[J]. 计算机应用研究, 2012,29(4): 1452-1456.
|
|
LIU F , YANG M . Ciphertext policy attribute based encryption scheme for cloud storage[J]. Application Research of Comput-ers, 2012,29(4): 1452-1456.
|
[6] |
王帅, 常朝稳, 魏彦芬 . 基于云计算的 USB Key 身份认证方案[J]. 计算机应用研究, 2014,31(7): 2130-2134.
|
|
WANG S , CHANG C W , WEI Y F . USB key authentica-tion scheme based on cloud computing[J]. Application Research of Computers, 2014,31(7): 2130-2134.
|
[7] |
冯登国, 秦宇, 汪丹 ,等. 可信计算技术研究[J]. 计算机研究与发展, 2011,48(8): 1332-1349.
|
|
FENG D G , QIN Y , WANG D ,et al. Research on trusted computing technology[J]. Journal of Computer Research and Development, 2011,48(8): 1332-1349.
|
[8] |
秦中元, 胡爱群 . 可信计算系统及其研究现状[J]. 计算机工程, 2006,32(14): 111-113.
|
|
QIN Z Y , HU A Q . Trusted copmuting system and its currect computer engineering[J]. Computer Engineering, 2006,32(14): 111-113.
|
[9] |
张焕国, 陈璐, 张立强 . 可信网络连接研究[J]. 计算机学报, 2010,33(4): 706-717.
|
|
ZHANG H G , CHEN L , ZHANG L Q . Research on trusted network connection[J]. Chinese Journal of Computers, 2010,33(4): 706-717.
|
[10] |
于江, 苏锦海, 张永福 . 基于 USB-Key 的强口令认证方案设计与分析[J]. 计算机应用, 2011,31(2): 511-513.
|
|
YU J , SU J H , ZHANG Y F . Design and analysis of USB-Key based strong password authentication scheme[J]. Journal of Computer Applications, 2011,31(2): 511-513.
|
[11] |
Trusted Computing Group. TCG trusted network connect TNC architecture for interoperability[S]. 2009.
|
[12] |
Cisco. Cisco Network Admission Contro[R]. 2003.
|
[13] |
Microsoft. Network Access Pretection Platform Architec-ture[R]. 2004.
|