[1] |
冯登国, 张敏, 张妍 等. 云计算安全研究[J]. 软件学报, 2011,22(1): 71-83. FENG D G , ZHANG M , ZHANG Y et al. Study on cloud computing security[J]. Journal of Software, 2011,22(1): 71-83.
|
[2] |
俞银燕, 汤帜 . 数字版权保护技术研究综述[J]. 计算机学报, 2005,28(12): 957-968. YU Y Y , TANG Z . A survey of the research on digital rights management[J]. Chinese Journal of Computers, 2005,28(12): 957-968.
|
[3] |
马兆丰, 范科峰, 陈铭 . et al. 支持时空约束的可信数字版权管理安全许可协议[J]. 通信学报, 2008,29(10): 153-164. MA Z F , FAN K F , CHEN M et al. Trusted digital rights management protocol supporting for time and space constraint[J]. Journal on Communications, 2008,29(10): 153-164.
|
[4] |
ZHANG Z Y , PEI Q Q , YANG L et al. Establishing multi-party trust architecture for DRM by using game-theoretic analysis of security policies[J]. Chinese Journal of Electronics, 2009,18(3): 519-524.
|
[5] |
QIU Q , TANG Z , LI F et al. A personal DRM scheme based on social trust[J]. Chinese Journal of Electronics, 2012,21(4): 719-724.
|
[6] |
JAFARI M , SAFAVI-NAINI R , SHEPPARD N P . A rights management approach to protection of privacy in a cloud of electronic health records[A]. Proceedings of the 11th Annual ACM Workshop on Digital Rights Management[C]. Chicago, USA 2011. 23-29.
|
[7] |
WANG C K , ZOU P , LIU Z et al. CS-DRM: a cloud-based SIM DRM scheme for mobile internet[J]. Eurasip Journal on Wireless Communications and Networking[C].2011, 2011. 1-30.
|
[8] |
PETRLIC R . Proxy re-encryption in a privacy-preserving cloud computing DRM scheme[J]. Proceedings of the 4th International Symposium on Cyberspace Safety and SecurityCSS 2012[C]. Melbourne, Australia, 2012. 194-211.
|
[9] |
SAMANTHULA B K , HOWSER G , ELMEHDWI Y et al. An efficient and secure data sharing framework using homomorphic encryption in the cloud[A]. Proceedings of the 1st International Workshop on Cloud Intelligence[C]. Istanbul, Turkey, 2012. 1-8.
|
[10] |
CORENA J C , OHTSUKI T . Secure and fast aggregation of financial data in cloud-based expense tracking applications[J]. Journal of Network and Systems Management, 2012,20(4): 534-560.
|
[11] |
WU Y D , WEI Z , DENG R H . Attribute-based access to scalable media in cloud-assisted content sharing networks[J]. IEEE Transactions on Multimedia, 2013,15(4): 778-788.
|
[12] |
洪澄, 张敏, 冯登国 . 面向云存储的高效动态密文访问控制方法[J]. 通信学报, 2011,32(7): 125-132. HONG C , ZHANG M , FENG D G et al. Achieving efficient dynamic cryptographic access control in cloud storage[J]. Journal on Communications, 2011,32(7): 125-132.
|
[13] |
MULLER S , KATZENBEISSER S . A new DRM architecture with strong enforcement[J]. Proceedings of the 5th International Conference on Availability, Reliability, and Security, ARES 2010,Krakow, Poland, 2010. 397-403.
|
[14] |
CONRADO C , PETKOVIC M , JONKER W . Privacy-preserving digital rights management[A]. Proceedings of the Secure Data Management 2004, Toronto, Canada, 2004. 83-99.
|
[15] |
PERLMAN R , KAUFMAN C , PERLNER R . Privacy-preserving DRM[A]. Proceedings of the 9th Symposium on Identity and Trust on the Internet, IDtrust 2010[C]. New York, USA, 2010. 69-83.
|
[16] |
PETRLIC R , SORGE C . Privacy-preserving DRM for cloud computing[A]. Proceedings of 26th IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2012[C]. Fukuoka, Japan, 2012. 1286-1291.
|
[17] |
SAHAI A , WATERS B . Fuzzy identity-based encryption[A]. Proceedings of EUROCRYPT 2005[C]. Aarhus, Denmark, 2005. 457-473.
|
[18] |
RIVEST R , SHARMIR A , DERTOUZONS M . On Data Banks and Privacy Homomorphisms[M]. Proceedings of EUROCRYPT 2005[C]. Orlando: Academic Press 1978.
|
[19] |
GENTRY C . Fully homomorphic encryption using ideal lattices[A]. Proceedings of the 41st Annual ACM Symposium on Theory of Computing[C]. New York, USA, 2009. 169-178.
|
[20] |
DIJK M , GENTRY C , HALEVI S et al. Fully homomorphic encryption over the integers[A]. Proceedings of Advances in Cryptology-Eurocrypt[C]. Riviera, France, 2010. 24-43.
|
[21] |
CASTELLUCCIA C , MYKLETUN E , TSUDIK G . Efficient aggregation of encrypted data in wireless sensor networks[A]. Proceedings of the Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services[C]. San Diego, USA, 2005. 109-117.
|
[22] |
BETHENCOURT J , SAHAI A , WATERS B . Advanced crypto software collection[EB/OL]. .
|