共 19 条
- [1] AMBRUST M, FOX A, JOSEPH A D, Et al., Above the clouds: a berkeley view of cloud computing, (2009)
- [2] MELL P M, GRANCE T., The NIST definition of cloud computing, (2011)
- [3] JULISCH K, HALL M., Security and control in the cloud, Information Security Journal: A Global Perspective, 19, 6, pp. 299-309, (2010)
- [4] FENG D G, ZHANG M, ZHANG Y, Et al., Study on cloud computing security, Journal of Software, 22, 1, pp. 71-83, (2011)
- [5] TANG Y, LEE P P C, LUI J C S, Et al., Secure overlay cloud storage with access control and assured deletion, IEEE Transactions on Dependable and Secure Computing, 9, 6, pp. 903-916, (2012)
- [6] SONG D X, WAGNER D, PERRIG A., Practical techniques for searches on encrypted data, Proceeding 2000 IEEE Symposium on Security and Privacy, pp. 44-55, (2000)
- [7] BONEH D, CRESCENZO G, OSTROVSKY R, Et al., Public key encryption with keyword search, International Conference on the Theory and Applications of Cryptographic Techniques, pp. 506-522, (2004)
- [8] GOLLE P, STADDON J, WATERS B., Secure conjunctive keyword search over encrypted data, Proceedings of the 2nd International Conference on Applied Cryptography and Network Security, pp. 31-45, (2004)
- [9] BALLARD L, KAMARA S, MONROSE F., Achieving efficient conjunctive keyword searches over encrypted data, Proceedings of the 7th International Conference on Information and Communications Security, pp. 414-426, (2005)
- [10] RYU E K, TAKAGI T., Efficient conjunctive keyword-searchable encryption, Proceedings of 21st International Conference on Advanced Information Networking and Applications Workshops, pp. 409-414, (2007)