参考文献
[1]MYERS A C,LISKOV B.Protecting Privacy Using the Decentralized Label Model[J].ACM Transactions on Software Engineering & Methodology,2003,9(4):410-442.
[2]吴泽智.信息流控制研究进展[J].软件学报,2017,28(1):135-159.
[3]王庆飞.IaaS下虚拟机的安全存储和可信启动[J].武汉大学学报(理学版),2014,60(3):231-236.
[4]PANDEY A,SRIVASTAVA S.An Approach for Virtual Machine Image Security[C]//Proceedings of IEEE International Conference on Signal Propagation and Computer Technology.Washington D.C.,USA:IEEE Press,2014:159-168.
[5]ZHOU W.Always Up-to-date:Scalable Offline Patching of VM Images in a Compute Cloud[C]//Proceedings of ACSAC’10.Austin,USA:[s.n.],2010:6-10.
[6]ZHANG Q.Neon:System Support for Derived Data Management[C]//Proceedings of ACM Sigplan/Sigops International Conference on Virtual Execution Environments.New York,USA:ACM Press,2010:158-166.
[7]ERMOLINSKIY A.Design and Implementation of a Hypervisor-based Platform for Dynamic Information Flow Tracking in a Distributed Environment[D].Berkeley,USA:University of California at Berkeley Berkeley,2011.
[8]MUNDADA Y,RAMACHANDRAN A,FEAMSTER N.Silverline:Data and Network Isolation for Cloud Services[C]//Proceedings of Usenix Conference on Hot Topics in Cloud Computing.Washington D.C.,USA:IEEE Press,2011:321-332.
[9]PRIEBE C.CloudSafetyNet:Detecting Data Leakage Between Cloud Tenants[C]//Proceedings of ACM Workshop on Cloud Computing Security.New York,USA:ACM Press,2014:117-128.
[10]BETHENCOURT J,SAHAI A,WATERS B.Ciphertext-policy Attribute-based Encryption[C]//Proceedings of IEEE Symposium on Security & Privacy.Washington D.C.,USA:IEEE Press,2007:321-334.
[11]PASQUIER T,BACON J,EYERS D.FlowK:Information Flow Control for the Cloud[C]//Proceedings of IEEE International Conference on Cloud Computing Technology & Science.Washington D.C.,USA:IEEE Press,2015:70-77.
[12]PASQUIER J M,BACON J,SHAND B.FlowR:Aspect Oriented Programming for Information Flow Control in Ruby[C]//Proceedings of ACM International Conference on Modularity.New York,USA:ACM Press,2014:64-77.
[13]SINGH J.Integrating Messaging Middleware and Information Flow Control[C]//Proceedings of IEEE International Conference on Cloud Engineering.Washington D.C.,USA:IEEE Press,2015:456-465.
[14]SINGH J,BACON J.SBUS:A Generic Policy-enforcing Middleware for Open Pervasive Systems:UCAM-CL-TR-847[D].Cambridge,UK:University of Cambridge Computer Laboratory,2014.
[15]PASQUIER J M,SINGH J,BACON J.Information Flow Control for Strong Protection with Flexible Sharing in PaaS[C]//Proceedings of IEEE International Workshop on the Future of PaaS.Washington D.C.,USA:IEEE Press,2015:25-34.
[16]WU R.Information Flow Control in Cloud Computing[C]//Proceedings of International Conference on Collaborative Computing:Networking,Applications and Worksharing.Washington D.C.,USA:IEEE Press,2010:1-7.
[17]ELSAYED M,ZULKERNINE M.IFCaaS:Information Flow Control as a Service for Cloud Security[C]//Proceedings of International Conference on Availability.Washington D.C.,USA:IEEE Press,2016:211-216.
[18]SHAMIR A.Identity-based Cryptosystems and Signature Schemes[J].Lecture Notes in Computer Science,1984,21(2):47-53.
[19]BONEH D,FRANKLIN M K.Identity Based Encryption from the Weil Pairing[J].Siam Journal on Computing,2001,32(3):213-229.
[20]COCKS C.An Identity Based Encryption Scheme Based on Quadratic Residues[C]//Proceedings of IMA International Conference on Cryptography & Coding.Cirencester,UK:[s.n.],2001:360-363.
[21]HORWITZ J.Toward Hierarchical Identity-based Encryption[C]//Proceedings of International Conference on Theory and Applications of Cryptographic Techniques.Amsterdam,the Netherlands:[s.n.].2002:58-65.
[22]GENTRY C,SILVERBERG A.Hierarchical ID-based Cryptography[J].Lecture Notes in Computer Science,2002,82(4):548-566.
[23]BONEH D,BOYEN X,Goh E J.Hierarchical Identity Based Encryption with Constant Size Ciphertext[C]//Proceedings of International Conference on Theory and Applications of Cryptographic Techniques.Berlin,Germany:Springer,2005:36-45.
[24]SAHAI A,WATERS B.Fuzzy Identity-based Encry-ption[C]//Proceedings of ACM International Conference on Theory and Applications of Cryptographic Techniques.New Yrok,USA:ACM Press,2005:212-222.
[25]GOYAL V.Attribute-based Encryption for Fine-grained Access Control of Encrypted Data[C]//Proceedings of ACM Conference on Computer and Communications Security.Alexandria,USA:ACM Press,2006:361-375.
[26]CHASE M.Multi-authority Attribute Based Encry-ption[M].Berlin,Germany:Springer,2007.
[27]CHASE M,CHOW S S M.Improving Privacy and Security in Multi-authority Attribute-based Encryption[C]//Proceedings of ACM Conference on Computer and Communications Security.Chicago,USA:PCM Press, 2009:269-275.
[28]KATZ J,SAHAI A,WATERS B.Predicate Encryption Supporting Disjunctions,Polynomial Equations,and Inner Products[J].Journal of Cryptology,2013,26(2):191-224.
[29]SHI E,WATERS B.Delegating Capabilities in Predicate Encryption Systems[C]//Proceedings of Automata,Languages & Programming,International Symposium.Reykjavik,Iceland:[s.n.],2008:560-578.
[30]LI M.Securing Personal Health Records in Cloud Computing:Patient-centric and Fine-grained Data Access Control in Multi-owner Settings[C]//Proceedings of SECURECOMM’10.Singapore:[s.n.],2010:7-9.
[31]YU S.Attribute Based Data Sharing with Attribute Revocation[C]//Proceedings of ASIACCS’10.Beijing,China:[s.n.],2010:112-131.
[32]LI M.Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-based Encryption[J].IEEE Transactions on Parallel & Distributed Systems,2013,24(24):131-143.
[33]李作辉,杨梦梦,陈性元.自适应安全与属性可重复的多授权机构ABE方案[J].计算机工程,2015,41(12):21-25.
[34]ZHU Y.How to Use Attribute-based Encryption to Implement Role-based Access Control in the Cloud[C]//Proceedings of IEEE International Workshop on Security in Cloud Computing.Washington D.C.,USA:IEEE Press,2013:154-165.
[35]DENNING D E.A Lattice Model of Secure Information Flow[J].Communications of the ACM,1976,19(5):236-243.
编辑索书志
|