[1] |
曾文英, 赵跃龙, 尚敏 . 云计算及云存储生态系统研究[J]. 计算机研究与发展, 2011,48(S1): 234-239.
|
|
ZENG W Y , ZHAO Y L , SHANG M . Research on cloud computing and cloud storage ecosystem[J]. Journal of Computer Research and Development, 2011,48(S1): 234-239.
|
[2] |
ABDALLA M , BELLARE M , CATALANO D ,et al. Searchable encryption revisited:consistency properties,relation to anonymous ibe,and extensions[J]. Journal of Cryptology, 2008,21(3): 350-391.
|
[3] |
CURTMOLA R , GARAY J , KAMARA S ,et al. Searchable symmetric encryption:improved definitions and efficient constructions[C]// ACM Conference on Computer and Communications Security (CCS). 2006: 79-88.
|
[4] |
CUI Z , ZHU H , CHI L . Lightweight key management on sensitive data in the cloud[J]. Security & Communication Networks, 2013,6(10): 1290-1299.
|
[5] |
ATALLAH M J , BLANTON M , FAZio N ,et al. Dynamic and efficient key management for access hierarchies[J]. ACM Transactions on Information and System Security (TISSEC), 2009,12(3): 1-43.
|
[6] |
BLUNDO C , CIMATO S , VIMERCATI S D C D ,et al. Efficient key management for enforcing access control in outsourced scenarios[C]// Emerging Challenges for Security. 2009: 364-375.
|
[7] |
CUI Z , ZHU H , SHI J ,et al. Lightweight management of authorization update on cloud data[C]// International Conference on Parallel and Distributed Systems (ICPADS). 2014: 456-461.
|
[8] |
BESSANI A , CORREIA M , QUARESMA B ,et al. DepSky:dependable and secure storage in a cloud-of-clouds[J]. ACM Transactions on Storage, 2011,9(4): 31-46.
|
[9] |
马华, 白翠翠, 李宾 ,等. 支持属性撤销和解密外包的属性基加密方案[J]. 西安电子科技大学学报自然科学版, 2015,42(6): 6-10.
|
|
MA H , BAI C C , LI B ,et al. Attribute-based encryption scheme supporting attribute revocation and decryption outsourcing[J]. Journal of Xidian University (Natural Science), 2015,42(6): 6-10.
|
[10] |
付东来, 彭新光, 杨玉丽 . 基于可信平台模块的外包数据安全访问方案[J]. 电子与信息学报, 2013,35(7): 1766-1773.
|
|
FU D L , PENG X G , YANG Y L . Trusted platform module-based scheme for secure access to outsourced data[J]. Journal of Electronics& Information Technology, 2013,35(7): 1766-1773.
|
[11] |
田丰, 桂小林, 张学军 ,等. 基于兴趣点分布的外包空间数据隐私保护方法[J]. 计算机学报, 2014,37(1): 123-138.
|
|
TIAN F , GUI X L , ZHANG X J ,et al. Privacy-preserving approach for outsourced spatial data based on POI distribution[J]. Chinese Journal of Computers, 2014,37(1): 123-138.
|
[12] |
周林, 矫文成, 吴杨 ,等. 一种基于层簇式的卫星网络组密钥管理方案[J]. 宇航学报, 2013,34(4): 559-567.
|
|
ZHOU L , JIAO W C , WU Y ,et al. A group key agreement protocol based on layer-cluster for satellite network[J]. Journal of Astronautics, 2013,34(4): 559-567.
|
[13] |
WONG C K , GOUDA M , LAM S S . Secure group communications using key graphs[J]. IEEE/ACM Transactions on Networking, 2000,8(1): 16-30.
|
[14] |
祝烈煌, 曹元大, 廖乐健 . 基于状态密钥树的安全群组密钥分发协议[J]. 北京理工大学学报, 2006,26(9): 805-808.
|
|
ZHU L H , CAO Y D , LIAO L J . Secure group key distribution protocol based on the status key tree[J]. Transactions of Beijing institute of Technology, 2006,26(9): 805-808.
|
[15] |
LI Y , DHOTRE N S , OHARA Y ,et al. Horus:fine-grained encryption-based security for large-scale storage[C]// Usenix Conference on File and Storage Technologies (FAST). 2013: 147-160.
|
[16] |
KALLAHALLA M , RIEDEL E , SWAMINATHAN R ,et al. Plutus:scalable secure file sharing on untrusted storage[C]// Usenix Conference on File and Storage Technologies. 2003: 29-42.
|
[17] |
MARTIN L . XTS:a mode of AES for encrypting hard disks[J]. IEEE Security & Privacy, 2010,8(3): 68-69.
|