共 24 条
[1]
Fine-graineddata access control systems with user accountability in cloud computing. J. Li,G. Zhao,X. Chen,D. Xie,C. Rong,W. Li,L. Tang,Y. Tang. IEEE2thInternational Conference on Cloud Computing Technology and Science CloudCom 2010 . 2010
[5]
HyperSentry:Enabling stealthy in-context measurement of hypervisor intergrity. Azab A M,Ning Peng,Wang Zhi,et al. Proceedings of the 17th ACM Conference on Computer and Communications Security (CCS 2010) . 2010
[6]
TNC architecture for interoperability. Trusted Computing Group. http://www.trustedcomputinggroup.org/resources/tnc_architecture_for_interoperability_specification . 2005
[7]
A secure and efficient revocation schemefor fine-grained access control in cloud storage. Zhang M,LüZ,Feng D,et al. Proceedings of the4th IEEE International Conference on Cloud Computing Technology andScience (Cloud Com) . 2012
[8]
Privacy-preserving multi-keyword rankedsearch over encrypted cloud data. Cao N,Wang C,Li M,et al. Parallel and Distributed Systems . 2014
[9]
A fully homomorphic encryption scheme. Gentry C. . 2009
[10]
"Privacy Preserving Keyword Search over Encrypted Cloud Data,". S. Ananthi,,M. S. Sendil,S. Karthik. Advances in Computing and Communications . 2011