Computer Science ›› 2015, Vol. 42 ›› Issue (8): 185-189.
Previous Articles Next Articles
JI Zheng-bo, BAI Guang-wei, SHEN Hang, CAO Lei and ZHU Rong
[1] 林闯,苏文博,孟坤,等.云计算安全:架构,机制与模型评价[J].计算机学报,2013,36(9):1765-1784 Ling Chuang,Su Wen-bo,Meng Kun,et al.Cloud Computing Security:Architecture,Mechanism and Modeling [J].Journal of Computers,2013,36(9):1765-1784 [2] 李瑞轩,董新华,辜希武,等.移动云服务的数据安全与隐私保护综述[J].通信学报,2013,34(12):158-166 Li Rui-xuan,Dong Xin-hua,Gu Xi-wu,et al.Overview of the data security and privacy-preserving of mobile cloud services [J].Journal of communications,2013,34(12):158-166 [3] Dou W,Zhang X,Liu J,et al.HireSome-II:Towards privacy-aware cross-cloud service composition for big data applications[J].IEEE Transactions on Parallel and Distributed Systems,2013,26(2):455-466 [4] Wang B,Li B,Li H.Oruta:Privacy-preserving public auditing for shared data in the cloud[C]∥Proc.of IEEE 5th InternationalConference on Cloud Computing(CLOUD).2012:295-302 [5] Zissis D,Lekkas D.Addressing cloud computing security issues [J].Future Generation Computer Systems,2012,28(3):583-592 [6] Camenisch J,Lysyanskaya A.A signature scheme with efficient protocols [M]∥Security in communication networks.Springer Berlin Heidelberg,2003:268-289 [7] Wang C,Chow S S M,Wang Q,et al.Privacy-preserving public auditing for secure cloud storage [J].IEEE Transactions on Computers,2013,62(2):362-375 [8] Wang C,Cao N,Ren K,et al.Enabling secure and efficientranked keyword search over outsourced cloud data [J].IEEE Transactions on Parallel and Distributed Systems,2012,23(8):1467-1479 [9] Sundareswaran S,Squicciarini A,Lin D.Ensuring distributed accountability for data sharing in the cloud [J].IEEE Transactions on Dependable and Secure Computing,2012,9(4):556-568 [10] Liu X,Zhang Y,Wang B,et al.Mona:secure multi-owner data sharing for dynamic groups in the cloud[J].IEEE Transactions on Parallel and Distributed Systems,2013,24(6):1182-1191 [11] Bohli J,Gruschka N,JensenM,et al.Security and Privacy Enhancing Multi-Cloud Architectures[J].IEEE Transactions on Dependable and Secure Computing,2013,0(4):212-224 [12] Zhu Y,Xu R,Takagi T.Secure k-NN computation on encrypted cloud data without sharing key with query users [C]∥Procee-dings of 2013 International Workshop on Security in Cloud Computing.ACM,2013:55-60 [13] Ren K,Wang C,Wang Q.Toward secure and effective data utilization in public cloud [J].IEEE Networks,2012,26(6):69-74 [14] Wang C,Wang Q,Ren K,et al.Toward secure and dependable storage services in cloud computing [J].IEEE Transactions on Services Computing,2012,5(2):220-232 [15] Wang H,Wu S,Chen M,et al.Security protection between users and the mobile media cloud [J].IEEE Communications Magazine,2014,52(3):73-79 [16] Liu C,Zhang X,Yang C,et al.CCBKE—Session key negotiation for fast and secure scheduling of scientific applications in cloud computing[J].Future Generation Computer Systems,2013,29(5):1300-1308 |
No related articles found! |
|