[1] 林宇锋,钟 金,吴复立.智能电网技术体系探讨[J].电网技术,2009,33(12):8-14. [2] Vaquero L M,Rodero-Merino L,Caceres J,et al.A Break in the Clouds:Towards a Cloud Definition[J].ACM SIGCOMM Computer Communication Review,2008,39(1):50-55. [3] Costanzo A,Assuncao M D,Buyya R.Harnessing Cloud Technologies for a Virtualized Distributed Computing Infrastructure[J].Internet Computing,2009,13(5):24-33. [4] 王德文,宋亚奇,朱永利.基于云计算的智能电网信息平台[J].电力系统自动化,2010,34(22):7-12. [5] 赵俊华,文福拴,薛禹胜.云计算——构建未来电力系统的核心计算平台[J].电力系统自动化,2010,34(15):1-8. [6] Kim Y J,Thottan M,Kolesnikov V,et al.A Secure Decentralized Data-centric Information Infrastructure for Smart Grid[J].Communications Magazine,2010,48(11):58-65. [7] Rajagopalan S R,Sankar L,Mohajer S,et al.Smart Meter Privacy:A Utility-privacy Framework[C]//Proceedings of IEEE International Conference on Smart Grid Comm-unications.[S.l.]:IEEE Press,2011:190-195. [8] Sankar L,Kar S,Tandon R,et al.Competitive Privacy in the Smart Grid:An Information-theoretic Approach[C]// Proceedings of IEEE International Conference on Smart Grid Communications.[S.l.]:IEEE Press,2011:220-225. [9] Li Qinghua,Cao Guohong.Multicast Authentication in the Smart Grid with One-time Signature[J].IEEE Transactions on Smart Grid,2011,2(4):686-696. [10] Fouda M M,Fadlullah Z M,Kato N,et al.A Light-weight Message Authentication Scheme for Smart Grid Communications[J].IEEE Transactions on Smart Grid,2011,2(4):675-685. [11] Li Depeng,Aung Z,Williams J R,et al.Efficient Authentication Scheme for Data Aggregation in Smart Grid with Fault Tolerance and Fault Diagnosis[C]//Proceedings of ISGT’12.[S.l.]:IEEE Press,2012:1-8. [12] 郭 非,曹珍富.一种基于身份的智能电网认证模式[J].黑龙江大学自然科学学报,2012,29(2):152-159. [13] Bobba R,Khurana H,AlTurki M,et al.PBES:A Policy Based Encryption System with Application to Data Sharing in the Power Grid[C]//Proceedings of the 4th International Symposium on Information,Computer,and Communications Security.[S.l.]:ACM Press,2009:262-275. [14] 孙中伟,张荣刚.智能配电网通信系统访问控制研究[J].电力系统保护与控制,2010,21(38):118-121. [15] Ruj S,Nayak A,Stojmenovic I.A Security Architecture for Data Aggregation and Access Control in Smart Grids[EB/OL].(2011-11-10).http://arxiv.org/abs/1111.2619. [16] Lewko A,Waters B.Decentralizing Attribute-based Encryption[M].Berlin,Germany:Springer,2011. [17] Sahai A,Waters B.Fuzzy Identity-based Encryp-tion[M].Berlin,Germany:Springer,2005. [18] Goyal V,Pandey O,Sahai A,et al.Attribute-based Encryption for Fine-grained Access Control of Encrypted Data[C]//Proceedings of the 13th ACM Conference on Computer and Communications Security.[S.l.]:ACM Press,2006:89-98. [19] Bethencourt J,Sahai A,Waters B.Ciphertext-policy Attribute-based Encryption[C]//Proceedings of IEEE Symposium on Security and Privacy.[S.l.]:IEEE Press,2007:321-334. [20] Hur J,Noh D K.Attribute-based Access Control with Efficient Revocation in Data Outsourcing Systems[J].IEEE Transactions on Parallel and Distributed Systems,2011,22(7):1214-1221. [21] 杨小东,王彩芬.基于属性群的云存储密文访问控制方案[J].计算机工程,2012,38(11):20-22,26. [22] Bethencourt J,Sahai A,Waters B.Advanced Crypto Software Collection:The Cpabe Toolkit[EB/OL].(2011-04-01).http://acsc.cs.utexas.edu/cpabe. |