[1] |
ZHAO Yang, CHEN Yang, XIONG Hu,et al.A Revocable Authorization Provable Data Possession Scheme in Clouds[J].Netinfo Security,2015,15(8):1-7.
|
|
赵洋,陈阳,熊虎,等. 云环境下一种可撤销授权的数据拥有性证明方案[J]. 信息网络安全,2015, 15(8):1-7.
|
[2] |
DESWARTE Y, QUISQUATER J J, SAÏDANE A. Remote Integrity Checking[M]// Springer. Integrity and Internal Control in Information Systems VI. Boston:Springer, Boston, MA, 2003:1-11.
|
[3] |
ATENIESE G, BURNS R, CURTMOLA R, et al.Provable data possession at untrusted stores[C]//ACM.The 14th ACM Conference on Computer and Communications Security, October 29 - November 2, 2007, Alexandria, Virginia, USA.New Yrok:ACM, 2007: 598-609.
|
[4] |
JUELS A, Burton S Kaliski Jr. PORs: Proofs of Retrievability for Large Files[C]//ACM.The 14th ACM Conference on Computer and Communications Security, October 29 - November 2, 2007, Alexandria, Virginia, USA.New Yrok:ACM, 2007:584-597.
|
[5] |
QIN Zhiguang,WU Shikun,XIONG hu. A Review on Data Integrity Auditing Protocols for Data Storage in Cloud Computing[J].Netinfo security,2014,14(7):1-6.
|
|
秦志光, 吴世坤, 熊虎. 云存储服务中数据完整性审计方案综述[J]. 信息网络安全, 2014, 14(7):1-6.
|
[6] |
WANG Huaquan.Proxy Provable Data Possession in Public Clouds[J]. IEEE Transactions on Services Computing, 2013, 6(4):551-559.
|
[7] |
WANG Boyang, CHOW S S M, LI Ming, et al. Storing Shared Data on the Cloud via Security-mediator[C] //IEEE.2013 IEEE 33rd International Conference on Distributed Computing Systems, July 8-11, 2013, Philadelphia, PA, USA.NJ:IEEE, 2013:124-133.
|
[8] |
WANG Huaqun, ZHANG Yuqing.On the Knowledge Soundness of a Cooperative Provable Data Possession Scheme in Multicloud Storage[J]. IEEE Transactions on Parallel and Distributed Systems, 2014, 25(1):264-267.
|
[9] |
WANG Huaqun, WU Qianhong, QIN Bo, et al.Identity-based Remote Data Possession Checking in Public Clouds[J]. IET Information Security, 2014, 8(2):114-121.
|
[10] |
ZHOU Jingzhe, CHEN Changsong.Analysis of Network Information Security in the Cloud Computing Architecture[J].Netinfo Security,2017, 17(11): 74-79.
|
|
周靖哲, 陈长松. 云计算架构的网络信息安全对策分析[J]. 信息网络安全, 2017, 17(11): 74-79.
|
[11] |
WANG Huaqun.Identity-based Distributed Provable Data Possession in Multicloud Storage[J]. IEEE Transactions on Services Computing, 2015, 8(2):328-340.
|