共 10 条
[1]
[Anonymous], 2009, SEC GUID CRIT AR FOC
[2]
Bowers KD, 2011, PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), P501
[3]
Proofs of Ownership in Remote Storage Systems
[J].
PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11),
2011,
:491-500
[4]
Mei Liu, 2010, Proceedings 2010 30th International Conference on Distributed Computing Systems Workshops (ICDCS 2010 Workshops), P82, DOI 10.1109/ICDCSW.2010.40
[5]
Mell P., 2011, NIST DEFINITION CLOU, P7
[6]
Ristenpart T, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P199
[7]
Wang C., 2010, P 30 IEEE INT C COMP, P525
[8]
Wang C, 2011, IEEE INFOCOM SER, P820, DOI 10.1109/INFCOM.2011.5935305
[9]
Wang R, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P338
[10]
Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing
[J].
2010 PROCEEDINGS IEEE INFOCOM,
2010,