[1] |
MICHAEL A , ARMANDO F , REAN G . Above the Clouds: a Berkeley View of Cloud Computing[R]. Berkeley:University of California,UC Berkeley Reliable Adaptive Distributed Systems Laboratory, 2009.
|
[2] |
童晓渝, 张云勇, 徐雷 . 智能普适网络[J]. 通信学报, 2011,32(7):182-188. TONG X Y , ZHANG Y Y , XU L . Intelligent ubiquitous network[J]. Journal on Communications, 2011,32(7):182-188.
|
[3] |
ANGEL J M , INY K . Spontaneous task composition in urban computing environments based on social,spatial and temporal aspects[J]. En-gineering Applications of Artificial Intelligence, 2011,24:1446-1460.
|
[4] |
ZHANG H G , LI C L , TANG M . Evolutionary cryptography against multidimensional linear cryptanalysis[J]. Sci China InfSci, 2011,54(12):2565-2577.
|
[5] |
WANG H Z , ZHANG H G , et al. Extended multivariate public key crypto systems with secure encryption function[J]. Sci China InfSci, 2011,54(6):1161-1171.
|
[6] |
ZHANG H G , LI C L , TANG M . Capability of evolutionary crypto-systems against differential cryptanalysis[J]. Sci China InfSci, 2011,54(10):1991-2000.
|
[7] |
TANG M , ZHANG H G , et al. Evolutionary chipers against differential power analysis and differential fault analysis[J]. Sci China InfSci, 2012,55(4):911-920.
|
[8] |
彭长根, 田有亮, 张豹 等. 基于同态加密体制的通用可传递签名方案[J]. 通信学报, 2013,34(11):18-25. PENG C G , TIAN Y L , ZHANG B , et al. General transitive signature scheme based on homomorphism encryption[J]. Journal on Communications, 2013,34(11):18-25.
|
[9] |
FENG D G , ZHANG M , et al. Study on cloud computing security[J]. Journal of Software, 2011,22(1):71-83.
|
[10] |
MARK D R . Cloud computing security: the scientific challenge,and a survey of solutions[J]. The Journal of Systems and Software, 2013,86:2263-2268.
|
[11] |
HASSAN T , JAMES B D , et al. Security and privacy challenges incloud computing environments[J]. IEEE Security and Privacy, 2010,10:24-31.
|
[12] |
SHAREEFULI , HARALAMBOS M , et al. Model based process to support security and privacy requirements engineering[J]. International Journal of Secure Software Engineering, 2012,3:1-3.
|
[13] |
NIR K . Privacy and security issues in cloud computing: the role of institutions and institutional evolution[J]. Telecommunications Policy, 2013,37:372-386.
|
[14] |
ALLIANCE C S . The notorious nine cloud computing top threats in 2013[EB/OL]. .
|
[15] |
BERTINO E , PACI F , et al. Privacy preserving digital identity man-agement for cloud computing[J]. IEEE Data Eng Bull, 2009,32(1):21-27.
|
[16] |
PELIN A , BHARAT B , et al. An entity-centric approach for privacy and identity management in cloud computing[A]. Proc of 29th IEEE Symposium on Reliable Distributed Systems[C]. 2010.177-183.
|
[17] |
HUSSAIN M . The Design and Applications of a Privacy-Preserving Identity and Trust-Management System[D]. Canada:School of Computing,Queen's University, 2010.
|
[18] |
CELESTI A , TUSA F , et al. Security and cloud computing: intercloud identity management infrastructure[A]. Proc of 2010 Workshops on Enabling Technologies[C]. 2010.263-265.
|
[19] |
ROHIT R , BHARAT B , et al. Protection of identity information in cloud computing without trusted third party[A]. Proc of the 29th IEEE Symposium on Reliable Distributed Systems[C]. 2010.368-372.
|
[20] |
GOVINDA K , SATHIYAMOORTHY D E . Identity anonymization and secure data storage using group signature in private cloud[J]. Procedia Technology, 2012,4:495-499.
|
[21] |
HARALAMBOS M , SHAREEFUL I , et al. A framework to support selection of cloud providers based on security and privacy require-ments[J]. The Journal of Systems and Software, 2013,86:2276-2293.
|
[22] |
WANG H . Privacy preserving data sharing in cloud computing[J]. Journal of Computer Science and Technology, 2010,25(3):401-414.
|
[23] |
CHUANG I-HSUN , LI S H , et al. An effective privacy protection scheme for cloud computing[A]. Proc of 13th International Conference on Advanced Communication Technology[C]. PyeongChang, 2011.260-265.
|
[24] |
SHERMAN S M C , HE Y J , et al. Simple privacy-preserving identity-management for cloud environment[A]. Proc of ACNS 2012[C]. Berlin Heidelberg, 2012.526-543.
|
[25] |
WEI L F , ZHU H J , et al. Security and privacy for storage and computa-tion in cloud computing[J]. Information Sciences, 2014,258:371-386.
|
[26] |
ADEELA W , ASAD R , et al. A framework for preservation of cloud users' data privacy using dynamic reconstruction of metadata[J]. Journal of Network and Computer Applications, 2013,36:235-248.
|
[27] |
GUO Z Z , LI M C , FAN X X . Attribute-based ring signcryption scheme[J]. Security and Comm Networks, 2013,6:790-796.
|
[28] |
LIU Z H , HU Y P , et al. Certificatelesssigncryption scheme in the standard model[J]. Information Sciences, 2010,180:452-464.
|
[29] |
ESSAM G . Sub-linear Blind Ring Signatures without Random Ora-cles[R]. Cryptology ePrint Archive,Report 2013/612, 2013.
|
[30] |
SHARMILA S D S , SREE V , et al. ID Based Signcryption Scheme in Standard Model[R]. Cryptology ePrint Archive,Report 2012/392, 2013.
|
[31] |
DAN B , MATT F . Identity-based encryption from the weil pairing[A]. Proc of CRYPTO 2001[C]. Berlin Heidelberg, 2001,213:229-464.
|