[1]彭智勇,彭煜玮.PostgreSQL数据库内核分析[M].北京:机械工业出版社,2012.br/
[2]MOMJIAN B.PostgreSQL introduction and conce-pts[J].Journal of Conflict Resolution,2001(3):353-355.br/
[3]WONG C K,GOUDA M,LAM S S.Secure group communications using key graphs[C]//Proceedings of ACM SIGCOMM Conference on Applications,Technologies,Architectures,and Protocols for Computer Communication.New York,USA:ACM Press,1998:68-79.br/
[4]SHERMAN A T,MCGREW D A.Key establishment in large dynamic groups using one-way function trees [J].IEEE Transactions on Software Engineering,2003,29(5):444-458.br/
[5]HAN Yiliang,GUI Xiaolin,WU Xuguang,et al.Proxy encryption based secure multicast in wireless mesh networks [J].Journal of Network and Computer Applications,2010,34(2):469-477.br/
[6]PERRIG A,SONG D,TYGAR J D.ELK,a new protocol for efficient large-group key distribution[C]//Proceedings of IEEE Symposium on Security and Privacy.Washington D.C.,USA:IEEE Press,2001:247-262.br/
[7]MITTRA S.A framework for scalable secure multica-sting[C]//Proceedings of ACM SIGCOMM Conference on Applications,Technologies,Architectures,and Protocols for Computer Communication.New York,USA:ACM Press,1997:277-288.br/
[8]SAHAI A,WATERS B.Fuzzy identity-based encry-ption[C]//Proceedings of International Conference on Theory and Applications of Cryptographic Techniques.Berlin,Germany:Springer-Verlag,2005:457-473.br/
[9]GOYAL V,PANDEY O,SAHAI A,et al.Attribute-based encryption for fine-grained access control of encrypted data[C]//Proceedings of ACM Conference on Computer and Communications Security.New York,USA:ACM Press,2006:89-98.br/
[10]李春梅,杨小东,周思安,等.一种面向社交网络的细粒度密文访问控制方案[J].计算机工程,2015,41(2):117-121.br/
[11]RIVEST R L.All-or-nothing encryption and the package transform[C]//Proceedings of International Workshop on FAST Software Encryption.Washington D.C.,USA:IEEE Press,1997:210-218.br/
[12]周德华.代理重加密体制的研究[D].上海:上海交通大学,2013.br/
[13]王会歌,王彩芬,曹浩,等.具有代理重加密性质的自认证签密方案[J].计算机工程,2012,38(13):122-124.br/
[14]郑志恒,张敏情,戴晓明,等.高效的基于代理重加密的云存储访问控制方案[J].电子技术应用,2016,42(11):99-101.br/
[15]SYALIM A,NISHIDE T,SAKURAI K.Realizing proxy re-encryption in the symmetric world[J].Communications in Computer & Information Science,2011,251:259-274.br/ |