[1] |
李伯虎, 张霖, 任磊 ,等. 云制造典型特征、关键技术与应用[J]. 计算机集成制造系统, 2012,18(7): 1345-1356.
|
|
LI B H , ZHANG L , REN L ,et al. Typical characteristics,technologies and applications of cloud manufacturing[J]. Computer Integrated Manufacturing Systems, 2012,18(7): 1345-1356.
|
[2] |
江家仁 . 虚拟化安全—公有云安全的核心关键问题探讨[J]. 电信科学, 2015,31(12): 121-124.
|
|
JIANG J R . Virtualization security,discussion on key issues of public cloud computing security[J]. Telecommunications Science, 2015,31(12): 121-124.
|
[3] |
李顺东, 窦家维, 王道顺 . 同态加密算法及其在云安全中的应用[J]. 计算机研究与发展, 2015,52(6): 1378-1388.
|
|
LI S D , DOU J W , WANG D S . Survey on homomorphic encryption and its applications to cloud security[J]. Journal of Computer Research and Development, 2015,52(6): 1378-1388.
|
[4] |
郭强, 孙大为, 常桂然 ,等. 一种基于虚拟化技术增强云安全的可信赖模型[J]. 东北大学学报(自然科学版), 2011,32(6): 786-790.
|
|
GUO Q , SUN D W , CHANG G R ,et al. A virtualization techniques based dependability model to enhance security of cloud computing environments[J]. Journal of Northeastern University(Natural Science), 2011,32(6): 786-790.
|
[5] |
蔡红云, 田俊峰, 李珍 ,等. 基于信任领域和评价可信度量的信任模型研究[J]. 计算机研究与发展, 2011,48(11): 2131-2138.
|
|
CAI H Y , TIAN J F , LI Z,et.al . Trust model based on trust area and evaluation credibility[J]. Journal of Computer Research and Development, 2011,48(11): 2131-2138.
|
[6] |
YU Y , LI K , ZHOU W ,et al. Trust mechanisms in wireless sensor networks:attack analysis and countermeasures[J]. Journal of Network & Computer Applications, 2012,35(3): 867-880.
|
[7] |
LOUATI A , HADDAD J E , PINSONP S . Trust-based coalition formation for dynamic service composition in social networks[M]// Web Information Systems Engineering WISE 2015. Heidelberg:Springer, 2015: 570-585.
|
[8] |
陈亚睿, 田立勤, 杨扬 . 云计算环境下基于动态博弈论的用户行为模型与分析[J]. 电子学报, 2011,39(8): 1818-1823.
|
|
CHEN Y R , TIAN L Q , YANG Y . Model and analysis of user behavior based on dynamic game theory in cloud computing[J]. Chinese Journal of Electronics, 2011,39(8): 1818-1823.
|
[9] |
肖云鹏, 姚豪豪, 刘宴兵 . 一种基于云模型的WSN节点信誉安全方案[J]. 电子学报, 2016,44(1): 168-175.
|
|
XIAO Y P , YAO H H , LIU Y B . A WSN node reputation security scheme based on cloud model[J]. Chinese Journal of Electronics, 2016,44(1): 168-175.
|
[10] |
ZONOUZ S , HOUMANSADR A , BERTHIER R ,et al. Secloud:a cloud-based comprehensive and lightweight security solution for smart phones[J]. Computers & Security, 2013,37(9): 215-227.
|
[11] |
NITTI M , GIRAU R , ATZORI L . Trustworthiness management in the social internet of things[J]. IEEE Transactions on Knowledge & Data Engineering, 2014,26(5): 1253-1266.
|
[12] |
汤雅妃, 张云勇, 张尼 . 基于指纹识别的云安全认证技术[J]. 电信科学, 2015,31(8): 166-172.
|
|
TANG Y F , ZHANG Y Y , ZHANG N . Cloud security certification technology based on fingerprint recognition[J]. Telecommunications Science, 2015,31(8): 166-172.
|
[13] |
沈士根, 刘建华, 曹奇英 . 博弈论与无线传感器网络安全[M]. 北京: 清华大学出版社, 2016: 114-132.
|
|
SHEN S G , LIU J H , CAO Q Y . Game theory meets wireless sensor networks security[M]. Beijing: Tsinghua University PressPress, 2016: 114-132.
|
[14] |
YANG X , HUANG X , LIU J K . Efficient handover authentication with user anonymity and untraceability for mobile cloud computing[J]. Future Generation Computer Systems, 2015,62(C): 190-195.
|
[15] |
ZOU Y , WANG G . Intercept behavior analysis of industrial wireless sensor networks in the presence of eavesdropping attack[J]. IEEE Transactions on Industrial Informatics, 2016,12(2): 780-787.
|