[1] |
WANG G J , YUE F S , LIU Q . A secure self-destructing scheme for electronic data[J]. Journal of Computer and System Sciences, 2013,79(2): 279-290.
|
[2] |
熊金波, 姚志强, 马建峰 , 等. 面向网络内容隐私的基于身份加密的安全自毁方案[J]. 计算机学报, 2014,37(1): 139-150. XIONG J B , YAO Z Q , MA J F , et al. A secure self-destruction scheme with IBE for the internet content privacy[J]. Chinese Journal of Computers, 2014,37(1): 139-150.
|
[3] |
田荣阳 . 数据网格中的副本定位及选择服务[D]. 重庆:重庆大学, 2006. TIAN R Y . Replica Location in the Grid Location and Selection Service[D]. Chongqing:Chongqing University, 2006.
|
[4] |
MERKLE R C . One way hash functions and DES[J]. Lecture Notes in Computer Science, 1990,435: 428-446.
|
[5] |
XIONG J B , LI F H , MA J F , et al. A full lifecycle privacy protection scheme for sensitive data in cloud computing[J]. Peer-to-Peer Networking and Applications, 2015,8(6): 1025-1037.
|
[6] |
TANG Y , LEE P P C , LUI J C S , et al. FADE:secure overlay cloud storage with file assured deletion[A]. Security and Privacy in Communication Networks[C]. 2010. 380-397.
|
[7] |
PERLMAN R . File system design with assured delete[A]. IEEE International Security in Storage Workshop[C]. 2005.88.
|
[8] |
TANG Y , LEE P P C , LUI J C S , et al. Secure overlay cloud storage with access control and assured deletion[J]. IEEE Transactions on,Dependable and Secure Computing, 2012,9(6): 903-916.
|
[9] |
GEAMBASU R , KOHNO T , LEVY A A , et al. Vanish:increasing data privacy with self-destructing data[A]. USENIX Security Symposium[C]. 2009. 299-316.
|
[10] |
熊金波, 姚志强, 马建峰 , 等. 基于属性加密的组合文档安全自毁方案[J]. 电子学报, 2013,42(2): 366-376. XIONG J B , YAO Z Q , MA J F , et al. A secure self-destruction scheme for composite documents with attribute based encryption[J]. Acta Electronica Sinica, 2013,42(2): 366-376.
|
[11] |
姚志强, 熊金波, 马建峰 , 等. 云计算中一种安全的电子文档自毁方案[J]. 计算机研究与发展, 2014,51(7): 1417-1423. XIONG J B , YAO Z Q , MA J F ,et al. A secure electronic document self-destructing scheme in cloud computing[J]. Journal of Computer Research and Development, 2014,51(7): 1417-1423.
|
[12] |
XIONG J B , YAO Z Q , MA J F , et al. A secure document self-destruction scheme with identity based encryption[A]. Proc of the 5th IEEE International Conference on Intelligent Networking and Collaborative Systems[C]. 2013. 239-243.
|
[13] |
王丽娜, 任正伟, 余荣威 , 等. 一种适于云存储的数据确定性删除方法[J]. 电子学报, 2012,40(2): 266-272. WANG L N , REN Z W , YU R Z ,et al. A data assured deletion approach adapted for cloud storage[J]. Acta Electronica Sinica. 2012,40(2): 266-272.
|
[14] |
XIONG J B , LIU X M , YAO Z Q , et al. A secure data self-destructing scheme in cloud computing[J]. IEEE Transactions on Cloud Computing, 2014,2(4): 448-458.
|
[15] |
李东升, 李春江, 肖依 , 等. 数据网格环境下一种动态自适应的副本定位方法[J]. 计算机研究与发展, 2003,40(12): 1775-1780. LI D S , LI C J , XIAO N , et al. Dynamic self-adaptive replica location method in data grids[J]. Journal of Computer Research and Development, 2003,40(12): 1775-1780.
|
[16] |
刘田甜, 李超, 胡庆成 , 等. 云环境下多副本管理综述[J]. 计算机研究与发展, 2011,S3: 254-260. LIU T T , LI C , HU Q C ,et al. Multiple-replicas management in the cloud environment[J]. Journal of Computer Research and Development, 2011,S3: 254-260.
|
[17] |
苏金树, 曹丹, 王小峰 , 等. 属性基加密机制[J]. 软件学报, 2011,22(6): 1299-1315. SU J S , CAO D , WANG X F , et al. Attribute-based encryption schemes[J]. Journal of Software, 2011,22(6): 1299-1315.
|
[18] |
WHITE T . Hadoop:the definitive guide[J]. O’reilly Media Inc Gravenstein Highway North, 2010,215(11): 1-4.
|