参考文献
[1] 陈 康, 郑纬民. 云计算: 系统实例与研究现状[J]. 软件学报, 2009, 20(5): 1337-1348.
[2] Armbrust M, Fox A, Griffith R, et al. A View of Cloud Computing[J]. Communications of the ACM, 2010, 53(4): 50-58.
[3] 周 茜, 于 炯. 云计算下基于信任的防御系统模型[J]. 计算机应用, 2011, 31(6): 1531-1535.
[4] 刘亚秋, 邢乐乐, 景维鹏. 云计算环境下基于时间期限和预算的调度算法[J]. 计算机工程, 2013, 39(6): 56-59.
[5] Gu Yunhong, Grossman R L. Sector: A High Performance Wide Area Community Data Storage and Sharing System[J]. Future Generation Computer Systems, 2010, 26(5): 720-728.
[6] Kubiatowicz J, Bindel D, Chen Yan, et al. OceanStore: An Architecture for Global-scale Persistent Storage[J]. ACM Sigplan Notices, 2000, 35(11): 190-201.
[7] Dimakis A, Godfrey P, Wu Yunnan, et al. Network Coding for Distributed Storage Systems[J]. IEEE Transactions on Information Theory, 2010, 56(9): 4539-4551.
[8] Ateniese G, Burns R, Curtmola R, et al. Remote Data Checking Using Provable Data Possession[J]. ACM Transactions on Information and System Security, 2011, 14(1).
[9] Wu Yunnan. A Construction of Systematic MDS Codes with Minimum Repair Bandwidth[J]. IEEE Transactions on Information Theory, 2011, 57(6): 3738-3741.
[10] Dimakis A G, Ramchandran K, Wu Yunnan, et al. A Survey on Network Codes for Distributed Storage[J]. Proceedings of the IEEE, 2011, 99(3): 476-489.
[11] Luby M G, Mitzenmacher M, Shokrollahi M A, et al. Efficient Erasure Correcting Codes[J]. IEEE Transactions on Information Theory, 2001, 47(2): 569-584.
[12] Weatherspoon H, Kubiatowicz J D. Erasure Coding Vs. Repli- cation: A Quantitative Comparison[C]//Proc. of International Workshop on Peer-to-Peer Systems. Berlin, Germany: Springer, 2002: 328-337.
[13] Reed I S, Solomon G. Polynomial Codes over Certain Finite Fields[J]. Journal of the Society for Industrial & Applied Mathematics, 1960, 8(2): 300-304.
[14] Bao Xingkai, Li Jing. Generalized Adaptive Network Coded Cooperation(GANCC): A Unified Framework for Network Coding and Channel Coding[J]. IEEE Transactions on Communications, 2011, 59(11): 2934-2938.
[15] Shacham H, Waters B. Compact Proofs of Retrievability[C]// Proc. of ASIACRYPT’08. Berlin, Germany: Springer, 2008: 90-107.
[16] Yu Shucheng, Wang Cong, Li Jin, et al. Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing[C]//Proc. of INFOCOM’10. San Diego, USA: IEEE Press, 2010: 1-9.
编辑 金胡考 |