参考文献
[1]Zhou Minqi,Zhang Rong,Xie Wei,et al.Security and Privacy in Cloud Computing:A Survey[C]//Proceedings of the 6th International Conference on Semantics Knowledge and Grid.Washington D.C.,USA:IEEE Press,2010:105112.
[2]冯登国,张敏,张妍,等.云计算安全研究[J].软件学报,2011,21(1):7183.
[3]Chen Deyan,Zhao Hong.Data Security and Privacy Protection Issues in Cloud Computing[C]//Proceedings of 2012 International Conference on Computer Science and Electronics Engineering.Washington D.C.,USA:IEEE Press,2012:647651.
[4]Sinha T,Srikanth V,Sain M,et al.Trends and Research Directions for Privacy Preserving Approaches on the Cloud[C]//Proceedings of the 6th ACM India Computing Convention.New York,USA:ACM Press,2013:2132.
[5]Ferreira B,Domingos H.Management and Search of Private Data on Storage Clouds[C]//Proceedings of the Workshop on Secure and Dependable Middleware for Cloud Monitoring and Management.New York,USA:ACM Press,2012:47.
[6]Itani W,Kayssi A,Chehab A.Privacy as a Service:Privacyaware Data Storage and Processing in Cloud Computing Architectures[C]//Proceedings of International Conference on Dependable,Autonomic and Secure Computing.Washington
D.C.,USA:IEEE Press,2009:711716.
(下转第176页)
(上接第171页)
[7]Khan S M,Hamlen K W.AnonymousCloud:A Data Ownership Privacy Provider Framework in Cloud Computing[C]//Proceedings of the 11th International Conference on Trust,Security and Privacy in Computing and Communications.Washington
D.C.,USA:IEEE Press,2012:170176.
[8]齐远伟.基于匿名登录的云计算隐私保护研究与应用[D].西安:西北大学,2013.
[9]Takabi H.Privacy Aware Access Control for Data Sharing in Cloud Computing Environments[C]//Proceedings of the 2nd International Workshop on Security in Cloud Computing.Kyoto,Japan:[s.n.],2014:2734.
[10]Bertino E,Paci F,Ferrini R,et al.Privacypreserving Digital Identity Management for Cloud Computing[J].IEEE Data Engineering Bulletin,2009,32(1):2127.
[11]Zhang Gaofeng,Yang Yun,Yuan Dong,et al.A Trustbased Noise Injection Strategy for Privacy Protection in Cloud[J].Software:Practice and Experience,2012,42(4):431445.
[12]Zhang Gaofeng,Yang Yun,Chen Jinjun,et al.A Historical Probability Based Noise Generation Strategy for Privacy Protection in Cloud Computing[J].Journal of Computer and System Sciences,2012,78(5):13741381.
[13]Zhang Gaofeng,Yang Yun,Liu Xiao,et al.A Timeseries Pattern Based Noise Generation Strategy for Privacy Protection in Cloud Computing[C]//Proceedings of the 12th IEEE/ACM International Symposium on Cluster,Cloud and Grid
Computing.Washington D.C.,USA:IEEE Press,2012:458465.
[14]Zhang Gaofeng,Yang Yun,Chen Jinjun.A PrivacyLeakageTolerance Based Noise Enhancing Strategy for Privacy Protection in Cloud Computing[C]//Proceedings of the 12th IEEE International Conference on Trust,Security and Privacy
in Computing and Communications.Washington D.C.,USA:IEEE Press,2013:18.
[15]Gao Lipeng,Jia Juan,Dong Laibin.An Improved Fusion Algorithm of Evidence Theory[C]//Proceedings of Cross Strait Quadregional Radio Science and Wireless Technology Conference.Washington D.C.,USA:IEEE Press,2011:14951498.
[16]Zomlot L,Sundaramurthy S C,Luo Kui,et al.Prioritizing Intrusion Analysis Using DempsterShafer Theory[C]//Proceedings of the 4th ACM Workshop on Security and Artificial Intelligence.New York,USA:ACM Press,2011:5970.
编辑金胡考 |