[27] |
ADI S . Identity-based cryptosystems and signature schemes[J]. Lecture Notes in Computer Science, 1985,196(2): 47-53.
|
[28] |
DAN B , GIOVANNI D , RAFAIL O . Public key encryption with keyword search[C]// International Conference on the Theory and Applications of Cryptographic Techniques. Piscataway:IEEE Press, 2004: 506-522.
|
[29] |
KAMARA S , CHARALAMPOS P , TOM R . Dynamic searchable symmetric encryption[C]// ACM Conference on Computer and Communications Security. New York:ACM Press, 2012: 965-976.
|
[30] |
CURTMOLA R , GARAY J , KAMARA S ,et al. Searchable symmetric encryption:improved definitions and efficient constructions[J]. Journal of Computer Security, 2011,19(5): 895-934.
|
[31] |
CHANG Y , MICHAEL M . Privacy preserving keyword searches on remote encrypted data[C]// International Conference on Applied Cryptography and Network Security. Berlin:Springer, 2005: 442-455.
|
[32] |
王国峰, 刘川意, 韩培义 ,等. 基于访问代理的数据加密及搜索技术研究[J]. 通信学报, 2018,39(7): 1-14.
|
|
WANG G F , LIU C Y , HAN P Y ,et al. Research on technology of data encryption and search based on access broker[J]. Journal on Communications, 2018,39(7): 1-14.
|
[33] |
CLARKE J , ALEX B . The SQUID handbook[M]. Weinheim: Wiley-VchPress, 2004.
|
[34] |
DWORKIN M . Recommendation for block cipher modes of operation:methods and techniques[J]. National Institute of Standards and Technology Gaithersburg MD Computer Security, 2001,5(6): 669-675.
|
[35] |
STANFORD. Stanford javascript crypto library[R].(2013-11-17)[2020-03-08].
|
[36] |
OPENSSL SOFTWARE FOUNDATION . OpenSSL cryptography and SSL/TLS toolkit[R].(2009-10-07)[2020-03-08].
|
[37] |
DAN B , MATT F , BEN L ,et al. Stanford IBE library[R].(2011-09-20)[2020-03-08].
|
[38] |
KRAWCZYK H , RAN C , MIHIR B . HMAC:keyed-hashing for message authentication[R].(1997-02-01)[2020-03-08].
|
[39] |
RALLY. Macrobenchmarking framework for elasticsearch[R].(2015-12-22)[2020-03-08].
|
[1] |
FREEBUF. 2019年网络安全事件回顾(国际篇)[R].(2020-02-10)[2020-03-08].
|
|
FREEBUF. Review of cybersecurity incidents in 2019 (International)[R].(2020-02-10)[2020-03-08].
|
[2] |
SAN JOSE . Ciphercloud:cloud services adoption while ensuring security,compliance and control[R].(2017-06-19)[2020-03-08].
|
[3] |
NEIL M , BRIAN L , CRAIG L ,et al. Market guide for cloud access security brokers[R].(2016-10-24)[2020-03-08].
|
[4] |
SCOTT R , NATHAN K , BEN B ,et al. When automatic encryption leads to confusion and mistakes[C]// Symposium on Usable Privacy and Security.[S.n.:s.l]. 2013: 1-5.
|
[5] |
SOARERSOFT SOFTWARE . Folder encryption dog:encrypt your folder and maintain the privacy of your confidential data[R].(2012-03-19)[2020-03-08].
|
[6] |
RUOTI S , ANDERSEN J , MONSON T ,et al. Messageguard:a browser-based platform for usable,content-based encryption research[J]. arXiv Preprint,arXiv:1510.08943, 2015
|
[7] |
RUOTI S , KENT S , DANIEL Z . Layering security at global control points to secure unmodified software[C]// 2017 IEEE Cybersecurity Development. Piscataway:IEEE Press, 2017: 42-49.
|
[8] |
VIRTRU CORPORATION TERMS . Virtru:email encryption and data security for business privacy[R].(2017-01-24)[2020-03-08].
|
[9] |
WARREN H , DEVDATTA A , SUMEET J ,et al. Shadowcrypt:encrypted web applications for everyone[C]// ACM SIGSAC Conference on Computer and Communications Security. New York:ACM Press, 2014: 1028-1039.
|
[10] |
GUO X , HUANG Y , YE J ,et al. ShadowFPE:new encrypted Web application solution based on shadow DOM[J]. Mobile Networks and Applications, 2020(4): 1-14.
|
[11] |
BILLY L , SIMON C , CHENGYU S ,et al. Mimesis aegis:a mimicry privacy shield–a systems approach to data privacy on public cloud[C]// 23rd USENIX Security Symposium. Berkeley:USENIX Association, 2014: 33-48.
|
[12] |
GARTNER. Top 10 security projects for 2019[R].(2019-03-11)[2020-03-08].
|
[13] |
RALUCA P , REDFIELD , NICKOLAI Z ,et al. Cryptdb:protecting confidentiality with encrypted query processing[C]// 23rd ACM Symposium on Operating Systems. New York:ACM Press, 2011: 85-100.
|
[14] |
PODDAR R , TOBIAS B , RULUCA A . Arx:an encrypted database using semantically secure encryption[J]. Proceedings of the VLDB Endowment, 2019,12(11): 1664-1678.
|
[15] |
RALUCA P , EMELIE S , STEVEN V ,et al. Building Web applications on top of encrypted data using mylar[C]// 11th USENIX Symposium on Networked Systems Design and Implementation. Berkeley:USENIX Association, 2014: 157-172.
|
[16] |
BENI E H , LAGAISSE B , JOOSEN W ,et al. DataBlinder:a distributed data protection middleware supporting search and computation on encrypted data[C]// The 20th International Middleware Conference Industrial Track.[S.n.:s.l]. 2019: 50-57.
|
[17] |
SONG D , DAVID W , ADRIAN P . Practical techniques for searches on encrypted data[C]// 2000 IEEE Symposium on Security and Privacy. Piscataway:IEEE Press, 2000: 44-55.
|
[18] |
GOH E J . Secure indexes[J]. IACR Cryptology ePrint Archive, 2003(216): 1-19.
|
[19] |
CURTMOLA R , GARAY J , KAMARA S ,et al. Searchable symmetric encryption:improved definitions and efficient constructions[J]. Journal of Computer Security, 2011,19(5): 895-934.
|
[20] |
XIA Z , WANG X , SUN X ,et al. A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data[J]. IEEE Transactions on Parallel and Distributed Systems, 2016,27(2): 340-352.
|
[21] |
LI J , WANG Q , WANG C ,et al. Fuzzy keyword search over encrypted data in cloud computing[C]// Proceedings of IEEE INFOCOM. Piscataway:IEEE Press, 2010: 1-5.
|
[22] |
MARGARET ROUSE . Trusted platform module (TPM)[R].(2019-03-11)[2020-03-08].
|
[23] |
MDN CONTRIBUTORS . JavaScript API XMLHttpRequest[R].(2019-03-23)[2020-03-08].
|
[24] |
MDN CONTRIBUTORS . JavaScript API file[R].(2019-03-23)[2020-03-08].
|
[25] |
WITTERN E , ANNIE Y , YUNHUI Z ,et al. Statically checking Web API requests in JavaScript[C]// 39th International Conference on Software Engineering. Piscataway:IEEE Press, 2017: 244-254.
|
[26] |
VACCA J . Public key infrastructure[M]. Public Key Infrastructure: Building Trusted Applications and Web ServicesPress, 2004.
|