参考文献
[1]Niroshinie F,Seng W L,Wenny R.Mobile Cloud Computing:A Survey[J].Future Generation Computer Systems,2013,29(1):84-106.
[2]Sriram N P,Zygmunt J H.A Practical,Secure,and Verifiable Cloud Computing for Mobile Systems[J].Procedia Computer Science,2014,34:474-483.
[3]Khan A N,Mat K M,Khan S U,et al.Towards Secure Mobile Cloud Computing:A Survey[J].Future Generation Computer Systems,2013,29(5):1278-1299.
[4]焦金平,刘国艳.机构可问责的可追踪属性基加密方案[J].计算机工程,2015,41(7):163-170,176.
[5]Sahai A,Waters B.Fuzzy Identity-based Encryption[M]//Cramer R.Advances in Cryptology-EUROCRYPT 2005.Berlin,Germany:Springer-Verlag,2005:457-473.
[6]Ostrovsky R,Sahai A,Waters B.Attribute-based Encryption with Non-monotonic Access Structures[C]//Proceedings of the 14th ACM Conference on Computer and Com-munications Security.New York,USA:ACM Press,2007:195-203.
[7]Bethencourt J,Sahai A,Waters B.Ciphertext-Policy Attribute-Based Encryption[C]//Proceedings of 2007 IEEE Symposium on Security and Privacy.Washington D.C.,USA:IEEE Computer Society,2007:321-334.
[8]Hur J.Improving Security and Efficiency in Attribute-based Data Sharing[J].IEEE Transactions on Knowledge and Data Engineering,2013,25(10):2271-2282.
[9]薛矛,薛巍,舒继武.一种云存储环境下的安全存储系统[J].计算机学报,2015,38(5):987-998.
[10]Li Fei,Yog R,Mutt R,et al.Low Complexity Multi-authority Attribute Based Encryption Scheme for Mobile Cloud Computing[C]//Proceedings of the 7th IEEE International Symposium on Service-oriented System Engineering.Washington D.C.,USA:IEEE Computer Society,2013:573-577.
[11]Lü Zhiquan,Chi Jialin,Zhang Min,et al.Efficiently Attribute-based Access Control for Mobile Cloud Storage System[C]//Proceedings of the 13th IEEE International Conference on Trust,Security and Privacy in Computing and Communications.Washington D.C.,USA:IEEE Computer Society,2014:292-299.
[12]Zhou Zhibin,Huang Dijiang.Efficient and Secure Data Storage Operations for Mobile Cloud Computing[C]//Proceedings of the 8th International Conference on Network and Service Management.Laxenburg,Germany:International Federation for Information Processing,2012:37-45.
[13]彭开锋,张席.适应性安全且支持属性撤销的CP-ABE方案[J].计算机工程,2015,41(4):151-155.
[14]Ltani W,Kayssi A,Chehab A.Energy-efficient Incremental Integrity for Securing Storage in Mobile Cloud Com-puting[C]//Proceedings of International Conference on Energy Aware Computing.Washington D.C.,USA:IEEE Computer Society,2010:1-2.
[15]Yang Jian,Wang Haihang,Wang Jian,et al.Provable Data Possession of Resource Constrained Mobile Devices in Cloud Computing[J].Journal of Networks,2011,6(7):1033-1040.
编辑金胡考 |