[1] |
Cloud security alliance. Security guidance for critical areas of focus in cloud computing V3.0[EB/OL]. .
|
[2] |
Cloud security alliance. Top threats to cloud computing V2.0[EB/OL]. .
|
[3] |
Cloud security alliance. The notorious nine:cloud computing top threats in 2015[EB/OL]. .
|
[4] |
Cloud security alliance. Security guidance for critical areas of mobile computing[EB/OL]. .
|
[5] |
YU Z W , WANG C K , THOMBORSON C . A novel watermarking method for software protection in the cloud[J]. Software-Practice &Experience, 2000,42(4):409-430.
|
[6] |
NISHIMAKI R , WICHS D , ZHANDRY M . Anonymous traitor tracing:how to embed arbitrary information in a key[C]// Annual International Conference on the Theory and Applications of Cryp-tographic Techniques. 2016:388-419.
|
[7] |
BITANSKY N , GOLDWASSER S , JAIN A , et al. Time-lock puz-zles from randomized encodings[C]// The 2016 ACM Conference on Innovations in Theoretical Computer Science. 2016:345-356.
|
[8] |
COLLBERG C , HUNTWORK A , CARTE E . More on graph theo-retic software watermarks:implementation,analysis,and attacks[J]. Information and Software Technology, 2009,51(1):56-67.
|
[9] |
HAMILTON J , DANICIC S . An evaluation of the resilience of static java bytecode watermarks against distortive attacks[J]. Inter-national Journal of Computer Science, 2011,38(1):90-104.
|
[10] |
KAZUO O , YUANYU W , YUTAKA H , et al. A new watermarking method with obfuscated quasi-chirp transform[J]. Digital Forensics and Watermarking, 2012(7128):57-71.
|
[11] |
ROSADO D G , GóMEZ R , MELLADO D , et al. Security analysis in the migration to cloud environments[J]. Future Internet, 2012,4(2):469-487.
|
[12] |
GROBAUER B , WALLOSCHEK T , STOCKER E . Understanding cloud computing vulnerabilities[J]. IEEE Security Privacy, 2011,9(2):50-7.
|
[13] |
JANSEN W A . Cloud hooks:security and privacy issues in cloud computing[C]// The 44th Hawaii International Conference on Sys-tem Sciences. 2011:1-10.
|
[14] |
ZISSIS D , LEKKAS D . Addressing cloud computing security issues[J]. Futur Gener Comput Syst, 2012,28(3):583-592.
|
[15] |
OWENS D . Securing elasticity in the cloud[J]. Commun ACM, 2010,53(6):46-51.
|
[16] |
BISONG A , RAHMAN S . An overview of the security concerns in enterprise cloud computing[J]. International Journal of Network Security & Its Applications, 2011,3(1):30-45.
|
[17] |
HWANG K , LI D . Trusted cloud computing with secure resources and data coloring[J]. IEEE Internet Computing, 2010,14(5):14-22.
|
[18] |
张立和, 杨义先, 钮心忻 , 等. 软件水印综述[J]. 软件学报, 2008,14(2):268-27.
|
|
ZHANG L H , YANG Y X , NIU X X , et al. Review of software wa-termarking[J]. Journal of Software, 2008,14(2):268-27.
|
[19] |
NAGRA M , CHRONI J , NIKOLOPOULOS S D . An efficient graph codec system for software watermarking[C]// Computer Software and Applications Conference(COMPSACW2012). 2012:595-600.
|
[20] |
COLLBERG C , THOMBORSON C . Watermarking,tamper-proofing,and obfuscation-tools for software protection[J]. IEEE Transactions on Software Engineering, 2012,28(3):735-746.
|
[21] |
COLLBERG C , THOMBORSO C , GREGG M . Dynamic graph-based software watermarking[J]. ACM Transactions on Program-ming Languages and Systems, 2007,29(6):77-89.
|
[22] |
ARBOIT G . A method for watermarking java programs via opaque predicates[C]// The 5th International Conference on Electronic Commerce Research(ICECR-5). 2012:102-106.
|
[23] |
KAMEL I , ALBLUWI Q . A robust software watermarking for copyright protection[J]. Computers & Security, 2009,28(2):395-409.
|
[24] |
芦斌, 罗向阳, 刘粉林 . 一种基于混沌的软件水印算法框架及实现[J]. 软件学报, 2007,18(2):351-360.
|
|
LU B , LUO X Y , LIU F L . An algorithm framework and realization based on chaos software watermarking[J]. Journal of Software, 2007,18(2):351-360.
|
[25] |
DAI P F , WANG C K , YU Z W , et al. A software watermark based architecture for cloud security[J]. Web Technologies and Ap-plications, 2012(7235):270-281.
|
[26] |
YU Z W , WANG C K , THOMBORSON C . A novel watermarking method for software protection in the cloud[J]. Software—Practice& Experience, 2013,32(12):114-129.
|
[27] |
AKRAM M , ADAMU A . Steganographic software:analysis and implementation[J]. International Journal of Computers and Com-munications, 2012,6(1):35-42.
|