共 9 条
- [1] TUTORIAL:secure data outsourcing. SION R. 13th In-ternational Conference on Management of Data(COMAD 2006) . 2006
- [2] Resource consumptionShaping. HAMILTON J,TREADWELL D. http://www.perspectives.mvdirona.am/2008/12/17/ResourceConsumption shaping.aspx . 2008
- [3] Towards practical oblivi-ous RAM. STEFANOV E,SHI E,SONG D. Network and Distributed System SecuritySymposium(NDSS’’12) . 2012
- [4] A study ofsoft error consequences in hard disk drives. TSAI T,AMPORNPUNT N T,BAGCHI S. IEEE/IFIPInternational Conference on Dependable Systems and Net-works DSN 2012 . 2012
- [5] Fully homomorphic encryption using ideal lat-tices. GENTRY C. Proceedings of the 41st annual ACM symposiumon Symposium on theory of computing-STOC’’09 . 2009
- [6] Proofs of ownership in remote storage systems. S. Halevi,D. Harnik,B. Pinkas,A. Shulman-Peleg. Proc 18th ACM Conference on Computer and Communications Security (CCS) . 2011
- [7] the NIST definition of cloud computing. MELL P,GRANCE T. NIST special publication 800-145 . 2011
- [8] File system design with assured delete. PERLMAN R. Network and distributed system security symposium proceed-ings(NDSS’’07) . 2007
- [9] SPORC:group collaboration using untrusted cloud resour-ces. FELDMAN A J,ZELLER W P,FREEDMAN M J,et al. Proceedings of the 9th Symposium on OperatingSystems Design and Implementation(OSDI’’10) . 2010