共 6 条
[1]
The design of a redundant array of independent net-storages for improved confidentiality in cloud computing
[J].
JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS,
2012, 1 (01)
:1-19
[2]
Secure and privacy preserving keyword searching for cloud storage services[J] . Qin Liu,Guojun Wang,Jie Wu. Journal of Network and Computer Applications . 2011 (3)
[3]
Database encryption[J] . Erez Shmueli,Ronen Vaisenberg,Yuval Elovici,Chanan Glezer. ACM SIGMOD Record . 2010 (3)
[4]
A survey on security issues in service delivery models of cloud computing[J] . S. Subashini,V. Kavitha. Journal of Network and Computer Applications . 2010 (1)
[5]
Building web applications on top of encrypted data using Mylar .2 Popa R A,Stark E,Heifer J,et al. USENIX Symposium of Networked Systems Design and Implementation . 2014
[6]
Ens ure Data Security inCloud Storage .2 Xiao Zhang,Hong-tao Du,Jian-quan Chen,et a l. Network Comp uting a nd Information Security (NCIS) . 2011