[1] |
冯登国, 张敏, 张妍等 . 云计算安全研究[J]. 软件学报, 2011,22(1): 71-83. FENG D G , ZHANG M , ZHANG Y ,et al. Study on cloud computing security[J]. Journal of Software, 2011,22(1): 71-83.
|
[2] |
GREEN M , ATENIESE G . Identity-based proxy re-encryption[A]. Applied Cryptography and Network Security[C]. Springer Berlin Heidelberg, 2007.
|
[3] |
HAN J G , SUSILO W , MU Y . Identity-based data storage in cloud computing[J]. Future Generation Computer Systems, 2013,29(3): 673-681.
|
[4] |
WANG X A , YANG X Y . On the insecurity of an identity based proxy re-encryption scheme[J]. Fundamenta Informaticae, 2010,98(2-3): 277-281.
|
[5] |
YANG Y J , ZHANG Y C . A generic scheme for secure data sharing in cloud[A]. IEEE Parallel Processing Workshops (ICPPW),2011 40th International Conference[C]. 2011.
|
[6] |
ZHAO G S , RONG C , LI J ,et al. Trusted data sharing over untrusted cloud storage providers[A]. 2010 IEEE Second International Conference on Cloud Computing Technology and Science (CloudCom)[C]. 2010.
|
[7] |
王守信, 张莉, 李鹤松 . 一种基于云模型的主观信任评价方法[J]. 软件学报, 2010,21(6): 1341-1352. WNAG S X , ZHANG L , LI H S . Evaluation approach of subjective trust based on cloud model[J]. Journal of Software, 2010,21(6): 1341-1352.
|
[8] |
顾鑫, 徐正全, 刘进 . 基于云理论的可信研究及展望[J]. 通信学报, 2011,30(7): 176-181. GU X , XU Z Q , LIU J . Review of cloud based trust model[J]. Journal of Communications, 2011,29(7): 176-181.
|
[9] |
孟祥怡, 张光卫, 刘常昱 ,等. 基于云模型的主观信任管理模型研究[J]. 系统仿真学报, 2007,(14): 3310-3317. MENG X Y , ZHANG G W , LIU C Y ,et al. Research on subjective trust management model based on cloud model[J]. Journal of System Simulation, 2007,(14): 3310-3317.
|
[10] |
胡春华, 罗新星, 王四春 ,等. 云计算环境下基于信任推理的服务评价方法[J]. 通信学报, 2011,30(12): 72-81. HU C H , LU X X , WANG S C ,et al. Approach of service evaluation based on trust reasoning for cloud computing[J]. Journal on Communications, 2011,30(12): 72-81.
|
[11] |
赵菁, 冯登国, 杨林等 . 一个高效的选择密文安全的分类代理重加密方案[J]. 电子学报, 2011,(11): 2513-2519. ZHAO J , FENG D G , YANG L ,et al. CCA-secure type-based proxy re-encryption without pairings[J]. Acta Electronica Sinica, 2011,(11): 2513-2519.
|
[12] |
顾鑫, 徐正全, 涂洪涛 ,等. 云环境下可信服务的时效策略[J]. 武汉大学学报(信息科学版), 2013,(5): 626-630. GU X , XU Z Q , XU H T ,et al. Time effectiveness in trust services under cloud environment[J]. Geomatrics and Information Science of Wuhan University, 2013,(5): 626-630.
|