参考文献
[ 1 ] Royal K D,Akers K S, Lybarger M A, et al. Using
Social Network Analysis to Evaluate Research
Productivity and Collaborations [ J ]. The Journal of
Faculty Development,2014,28(1):49-58.
[ 2 ] Tramp S, Frischmuth P, Ermilov T, et al. An
Architecture of a Distributed Semantic Social Network[
J]. Semantic Web,2014,5(1):77-95.
[ 3 ] He Fei,Chen Meilian, Tang Rong, et al. Construction
and Algorithm Analysis of a Social Network System
Structure Based on P2P [ J ]. Applied Mechanics and
Materials,2014,443(8):504-508.
[ 4 ] Zhou Bin, Pei Jian. Preserving Privacy in Social
Networks Against Neighborhood Attacks [ C ] / /
Proceedings of the 24th IEEE International Conference
on Data Engineering. Cancun, Mexico: IEEE Press,
2008:506-515.
[ 5 ] Cutillo L A,Molva R,Strufe T. Safebook: A Privacypreserving
Online Social Network Leveraging on Reallife
Trust [J]. IEEE Communications Magazine,2009,
47(12):94-101.
(下转第128 页)
(上接第121 页)
[ 6 ] Heatherly R, Kantarcioglu M, Thuraisingham B.
Preventing Private Information Inference Attacks on
Social Networks[J]. IEEE Transactions on Knowledge
and Data Engineering,2013,25(8):1849-1862.
[ 7 ] 张胜兵,蔡皖东,李勇军. 一种基于博弈论的社交网络
访问控制方法[J]. 西北工业大学学报,2011,29(4):
652-657.
[ 8 ] Sun Jinyuan, Zhu Xiaoyan, Fang Yuguang. A Privacypreserving
Scheme for Online Social Networks with Efficient
Revocation[C]/ / Proceedings of IEEE INFOCOM’10. San
Diego,USA:IEEE Press,2010:1-9.
[ 9 ] 高训兵,马春光,赵 平,等. 社交网络中具有可传递
性的细粒度访问控制方案[J]. 计算机应用,2013,
33(1):8-11.
[10] Bethencourt J, Sahai A, Waters B. Ciphertext-policy
Attribute-based Encryption [C] / / Proceedings of IEEE
Symposium on Security and Privacy. Washington D. C. ,
USA:IEEE Computer Society,2007:321-334.
[11] Beimel A. Secure Schemes for Secret Sharing and Key
Distribution[D]. Haifa,Israel:Technion-Israel Institute
of Technology,1996.
[12] 吕志泉,张 敏,冯登国. 云存储密文访问控制方
案[J]. 计算机科学与探索,2011,5(9):835-844.
[13] 刘西蒙,马建峰,熊金波,等. 密文策略的权重属性基
加密方案[J]. 西安交通大学学报,2013,47(8):44-48.
[14] Sung M Y, Kim S, Lim S, et al. A Countermeasure
Against one Physical Cryptanalysis May Benefit Another
Attack[C] / / Proceedings of ICISC’01. Berlin,Germany: Springer,2002:414-427.
[15] Biryukov A,Khovratovich D. Related-key Cryptanalysis
of the Full AES-192 and AES-256[C] / / Proceedings of
ASIACRYPT ’ 09. Berlin, Germany: Springer, 2009:
1-18.
编辑 刘 冰 |