[1] |
CHEN L,CHEN X S,JIANG J F,et al.Research and Practice of Dynamic Network Security Architecture for IaaSPlatforms[J].Tsinghua Science and Technology,2014,19(5):496-507.
|
[2] |
LI H,DAI Y,TIAN L,et al.Identity-Based Authentication for Cloud Computing[C]// Springer.Proceedings of the First International Conference on Cloud Computing, December 1 - 4, 2009. Beijing, China.BerlinHeidelberg:Springer, 2009: 157-166.
|
[3] |
CRAMTON J, LIM, HW, et al.What can Identity-Based Cryptography Offer toWeb Services[C]// ACM. Proceedings ofthe 2007 ACM Workshop on Secure Web Services, Fairfax, VA, USA.New York:ACM,2007,26-36.
|
[4] |
ABAWAJY J.Determining Service Trustworthiness in InterCloud Computing Environments[C]//IEEE.Proceedings of the 10th International Symposium on Pervasive Systems,Kaohsiung, Taiwan,China.New York:IEEE,2009, 784-788.
|
[5] |
KANG L, ZHANG X.Identity-Based Authentication in Cloud Storage Sharing[C]//IEEE.IEEE International Conference on Multimedia Information Networking and Security,Nanjing, China.New York:IEEE,2010, 851-855.
|
[6] |
LIN R H, WU B D, YANG F C,et al.An Efficient Adaptive Failure Detection Mechanism for Cloud Platform based on VolterraSeries[J].China Communications ,2014, 11(4): 1-12.
|
[7] |
YANG K, JIA X.An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing[J].IEEE Transactions on Parallel and Distributed Systems,2013, 24(9):1717-1726.
|
[8] |
CHOUDHURY AJ, KUMAR P, SAIN M,et al.AStrong User Authentication Framework for Cloud Computing[C]// IEEE.Proceedings ofIEEE Asia-Pacific Services Computing Conference (APSCC), JejuIsland, South Korea.New York:IEEE,2011:110-115.
|
[9] |
KHAN RH, YLITALO J, AHMED AS.OpenID Authentication as aService in OpenStack[C]// IEEE.Proceedings of the 7th International Conference onInformation Assurance and Security (IAS)Melaka, Malaysia.New York:IEEE,2011:372-377.
|
[10] |
CHEN TH, YEH H, SHIH WK.An Advanced ECCDynamic ID-Based Remote Mutual Authentication Scheme for CloudComputing[C]//IEEE.Proceedings ofthe 5th FTRA International Conference Multimediaand Ubiquitous Engineering (MUE), Loutraki, Greece.New York:IEEE,2011:155-159.
|
[11] |
ARSHAD J, TOWNEND P, XU J.A Novel Intrusion Severity Analysis Approach for Clouds[J].Future Generation Computer Systems, 2013, 29: 416-428.
|
[12] |
RONG C, NGUYEN ST, JAATUN MG.Beyond Lightning: A Survey on Security Challenges in Cloud Computing[J].Computers and Electrical Engineering, 2013, 39: 47-54.
|
[13] |
KSHETRI N.PrivacyandSecurityIssuesinCloudComputing:TheRoleof InstitutionsandInstitutionalevolution[J].Telecommunications Policy,2013,37: 372-386.
|
[14] |
DONG X, YU J, LUO Y, CHEN Y,et al.Achieving An Effective, Scalable andPrivacy-preserving Data Sharing Servicein Cloud Computing[J].Computers &security, 2014, 42:151-164.
|
[15] |
MACKAY M, BAKER T, AL-YASIRI A.Security-oriented Cloud Computing Platform for CriticalInfrastructures[J].Computer Law &Security Review, 2012, 28: 679-686.
|
[16] |
WEI L, ZHU H, CAO Z,et al.Security and Privacy for Storage and Computation in CloudComputing[J].Information Sciences, 2014, 258: 371-386.
|
[17] |
冯登国,张敏,张妍,等. 云计算安全研究[J].软件学报, 2011, 22(1):71-83.
|
[18] |
张辉,王伟,郭栋. 一种基于微服务范式的桌面云构建框架[J]. 信息网络安全,2017(2):35-42.
|
[19] |
吴吉义, 沈千里, 章剑林, 等. 云计算: 从云安全到可信云[J].计算机研究与发展,2011,48:229-233.
|
[20] |
张大军,李运发,郑周. 云计算中数据资源的安全共享机制[J].信息网络安全,2012(8):79-82.
|
[21] |
AIHASIB A, HAQUE A M.A Comparative Study of the Performance and Security Issues of AES and RSA Cryptography[C]// ICCIT .Proceedings of the 3rd International Conference on Convergence and Hybrid Information Technology (ICCIT), November 11-13 ,2008,Busan.New York:IEEE,2008:505-510.
|
[22] |
KOCHER P C.Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems[C]// CRYPTO'96.Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology (CRYPTO'96), August 18 - 22, 1996 ,London. London :Springer-Verlag , 1996:104-113.
|