共 70 条
[11]
Bellare M., 1995, Proceedings of the Twenty-Seventh Annual ACM Symposium on the Theory of Computing, P45, DOI 10.1145/225058.225080
[12]
Ciphertext-policy attribute-based encryption
[J].
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2007,
:321-+
[14]
Boneh D, 2003, LECT NOTES COMPUT SC, V2656, P416
[15]
Buyya R., 2006, FUTURE GENER COMP SY, V26, P1189
[16]
Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility
[J].
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE,
2009, 25 (06)
:599-616
[17]
Energy-aware High Performance Computing - A Taxonomy Study
[J].
2011 IEEE 17TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS (ICPADS),
2011,
:953-958
[18]
Canepa H., 2010, P 1 ACM WORKSH MOB C
[19]
Chen E.Y., 2010, World of Wireless Mobile and Multimedia Networks (WoWMoM), 2010 IEEE International Symposium on a, P1, DOI [DOI 10.1109/WOWMOM.2010.5534992, 10.1109/WOWMOM.2010.5534992]
[20]
Authentication in the Clouds: A Framework and its Application to Mobile Users
[J].
PROCEEDINGS OF THE 2010 ACM WORKSHOP CLOUD COMPUTING SECURITY WORKSHOP (CCSW'10:),
2010,
:1-6