请告诉我们您的知识需求以及对本站的评价与建议。
满意 不满意
Email:
云计算安全研究参考文献
栏目最新
- 工程爆破行业的信息化发展现状、实施问题和建议
- BIM技术及在工程项目管理模式中的应用
- 建筑扬尘污染监控平台中的Kerberos协议改进
- 云计算安全研究报告(5):云计算安全关键技术研究
- 云计算安全研究报告(4):云计算安全技术框架建议
- 云计算安全研究报告(3):云计算安全现状
- 云计算安全研究报告(2):云计算安全挑战
- 云计算安全研究报告(1):云计算发展趋势
- 大型集团型建筑企业工程管理信息化工作探索
- 通过双机备份和异地数据复制提升跨地区企业信息系统安全性
网站最新
英文参考文献:
[1] IBM Blue Cloud Solution (in Chinese). http://www-900.ibm.com/ibm/ideasfromibm/cn/cloud/solutions/index.shtml.
[2] Sun Cloud Architecture Introduction White Paper (in Chinese). http://developers.sun.com.cn/blog/functionalca/resource/sun_353cloudcomputing_chinese.pdf.
[3] Barroso LA, Dean J, Holzle U. Web search for a planet: The Google cluster architecture. IEEE Micro, 2003,23(2):22−28.
[4] International Telegraph Union (ITU) (in Chinese). http://www.itu.int/en/pages/default.aspx.
[5] Organization for the Advancement of Structured Information Standards (OASIS) (in Chinese). http://www.oasis-open.org/.
[6] Distributed Management Task Force (DMTF) (in Chinese). http://www.dmtf.org/home.
[7] Cloud Security Alliance (in Chinese). http://www.cloudsecurityalliance.org.
[8] Crampton J, Martin K, Wild P. On key assignment for hierarchical access control. In: Guttan J, ed, Proc. of the 19th IEEEComputer Security Foundations Workshop—CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5−7.
[9] Damiani E, De S, Vimercati C, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategiesfor data outsourcing. In: Venter HS, Eloff MM, Labuschagne L, Eloff JHP, Solms RV, eds. New Approaches for Security, Privacyand Trust in Complex Environments, Proc. of the IFIP TC-11 22nd Int’l Information Security Conf. Sandton: Springer-Verlag,2007. 385−396.
[10] Goyal V, Pandey A, Sahai A, Waters B. Attribute-Based encryption for fine-grained access control of encrypted data. In: Juels A,Wright RN, Vimercati SDC, eds. Proc. of the 13th ACM Conf. on Computer and Communications Security, CCS 2006. Alexandria:ACM Press, 2006. 89−98.
[11] Bethencourt J, Sahai A, Waters B. Ciphertext-Policy attribute-based encryption. In: Shands D, ed. Proc. of the 2007 IEEE Symp. onSecurity and Privacy. Oakland: IEEE Computer Society, 2007. 321−334. [doi: 10.1109/SP.2007.11].
[12] Chang YC, Mitzenmacher M. Privacy preserving keyword searches on remote encrypted data. In: Ioannidis J, Keromytis AD, YungM, eds. LNCS 3531. New York: Springer-Verlag, 2005. 442−455.
[13] Malek B, Miri A. Combining attribute-based and access systems. In: Muzio JC, Brent RP, eds. Proc. IEEE CSE 2009, 12th IEEEInt’l Conf. on Computational Science and Engineering. IEEE Computer Society, 2009. 305−312.
[14] Ostrovsky R, Sahai A, Waters B. Attribute-Based encryption with non-monotonic access structures. In: Ning P, Vimercati SDC,Syverson PF, eds. Proc. of the 2007 ACM Conf. on Computer and Communications Security, CCS 2007. Alexandria: ACM Press,2007. 195−203.
[15] Yu S, Ren K, Lou W, Li J. Defending against key abuse attacks in KP-ABE enabled broadcast systems. In: Bao F, ed. Proc. of the5th Int’l Conf. on Security and Privacy in Communication Networks. Singapore: Springer-Verlag, http://www.linkpdf.com/ebook-viewer.php?url=http://www.ualr.edu/sxyu1/file/SecureComm09_AFKP_ABE.pdf.
[16] Hong C, Zhang M, Feng DG. AB-ACCS: A cryptographic access control scheme for cloud storage. Journal of Computer Researchand Development, 2010,47(Supplementary issue I):259−265 (in Chinese with English abstract).
[17] Boneh D, Franklin M. Identity-Based encryption from the Weil pairing. SIAM Journal on Computing, 2003,32(3):586−615.
[18] Ibraimi L, Petkovic M, Nikova S, Hartel P, Jonker W. Ciphertext-Policy attribute-based threshold decryption with flexibledelegation and revocation of user attributes. Technical Report, Centre for Telematics and Information Technology, University ofTwente, 2009.
[19] Roy S, Chuah M. Secure data retrieval based on ciphertext policy attribute-based encryption (CP-ABE) system for the DTNs.Technical Report, 2009.
[20] Goh EJ. Secure indexes. Technical Report, Stanford University, 2003. http://eprint.iacr.org/2003/216/.
[21] Chow R, Golle P, Jakobsson M, Shi E, Staddon J, Masuoka R, Molina J. Controlling data in the cloud: Outsourcing computationwithout outsourcing control. In: Sion R, ed. Proc. of the 2009 ACM Workshop on Cloud Computing Security, CCSW 2009,Co-Located with the 16th ACM Computer and Communications Security Conf., CCS 2009. New York: Association for ComputingMachinery, 2009. 85−90. [doi: 10.1145/1655008.1655020].
[22] Song D, Wagner D, Perrig A. Practical techniques for searches on encrypted data. In: Titsworth FM, ed. Proc. of the IEEEComputer Society Symp. on Research in Security and Privacy. Piscataway: IEEE, 2000. 44−55.
[23] Boneh D, Crescenzo G, Ostrovsky R, Persiano G. Public key encryption with keyword search. In: Cachin C, Camenisch J, eds.LNCS 3027. Heidelberg: Springer-Verlag, 2004. 506−522.
[24] Gentry C. Fully homomorphic encryption using ideal lattices. In: Mitzenmacher M, ed. Proc. of the 2009 ACM Int’l Symp. onTheory of Computing. New York: Association for Computing Machinery, 2009. 169−178.
[25] Juels A, Kaliski B. Pors: Proofs of retrievability for large files. In: Ning P, Vimercati SDC, Syverson PF, eds. Proc. of the 2007ACM Conf. on Computer and Communications Security, CCS 2007. Alexandria: ACM Press, 2007. 584−597.
[26] Ateniese G, Burns R, Curtmola R. Provable data possession at untrusted stores. In: Ning P, Vimercati SDC, Syverson PF, eds. Proc.of the 2007 ACM Conf. on Computer and Communications Security, CCS 2007. Alexandria: ACM Press, 2007. 598−609.
[27] Di Pietro R, Mancini LV, Ateniese G. Scalable and efficient provable data possession. In: Levi A, ed. Proc. of the 4th Int’l Conf. onSecurity and Privacy in Communication Netowrks. Turkey: ACM DL, 2008. http://eprint.iacr.org/2008/114.pdf [doi: 10.1145/1460877.1460889].
[28] Zeng K. Publicly verifiable remote data integrity. In: Chen LQ, Ryan MD, Wang GL, eds. LNCS 5308. Birmingham:Springer-Verlag, 2008. 419−434.
[29] Yun A, Shi C, Kim Y. On protecting integrity and confidentiality of cryptographic file system for outsourced storage. In: Sion R,ed. Proc. of the 2009 ACM Workshop on Cloud Computing Security, CCSW 2009, Co-Located with the 16th ACM Computer andCommunications Security Conf., CCS 2009. New York: Association for Computing Machinery, 2009. 67−76.
[30] Schwarz T, Ethan SJ, Miller L. Store, forget, and check: Using algebraic signatures to check remotely administered storage. In:Proc. of the 26th IEEE Int’l Conf. on Distributed Computing Systems. IEEE Press, 2006. 12−12. [doi: 10.1109/ICDCS.2006.80].
[31] Wang Q, Wang C, Li J, Ren K, Lou W. Enabling public verifiability and data dynamics for storage security in cloud computing. In:Backes M, Ning P, eds. LNCS 5789. Heidelberg: Springer-Verlag, 2009. 355−370.
[32] Roy I, Ramadan HE, Setty STV, Kilzer A, Shmatikov V, Witchel E. Airavat: Security and privacy for MapReduce. In: Castro M,eds. Proc. of the 7th Usenix Symp. on Networked Systems Design and Implementation. San Jose: USENIX Association, 2010.297−312.
[33] Bowers KD, Juels A, Oprea A. Proofs of retrievability: Theory and implementation. In: Sion R, ed. Proc. of the 2009 ACMWorkshop on Cloud Computing Security, CCSW 2009, Co-Located with the 16th ACM Computer and Communications SecurityConf., CCS 2009. New York: Association for Computing Machinery, 2009. 43−54. [doi: 10.1145/1655008.1655015].
[34] Muntés-Mulero V, Nin J. Privacy and anonymization for very large datasets. In: Chen P, ed. Proc of the ACM 18th Int’l Conf. onInformation and Knowledge Management, CIKM 2009. New York: Association for Computing Machinery, 2009. 2117−2118. [doi:10.1145/1645953.1646333]
[35] Raykova M, Vo B, Bellovin SM, Malkin T. Secure anonymous database search. In: Sion R, ed. Proc. of the 2009 ACM Workshopon Cloud Computing Security, CCSW 2009, Co-Located with the 16th ACM Computer and Communications Security Conf., CCS2009. New York: Association for Computing Machinery, 2009. 115−126. [doi: 10.1145/1655008.1655025].
[36] Elangop S, Dusseauaetal A. Deploying virtual machines as sandboxes for the grid. In: Karp B, ed. USENIX Association Proc. ofthe 2nd Workshop on Real, Large Distributed Systems. San Francisco, 2005. 7−12.
[37] Raj H, Nathuji R, Singh A, England P. Resource management for isolation enhanced cloud services. In: Sion R, ed. Proc. of the2009 ACM Workshop on Cloud Computing Security, CCSW 2009, Co-Located with the 16th ACM Computer and CommunicationsSecurity Conf., CCS 2009. New York: Association for Computing Machinery, 2009. 77−84. [doi: 10.1145/1655008.1655019].
[38] Wei J, Zhang X, Ammons G, Bala V, Ning P. Managing security of virtual machine images in a cloud environment. In: Sion R, ed.Proc. of the 2009 ACM Workshop on Cloud Computing Security, CCSW 2009, Co-Located with the 16th ACM Computer andCommunications Security Conf., CCS 2009. New York: Association for Computing Machinery, 2009. 91−96. [doi: 10.1145/1655008.1655021].
[1] IBM Blue Cloud Solution (in Chinese). http://www-900.ibm.com/ibm/ideasfromibm/cn/cloud/solutions/index.shtml.
[2] Sun Cloud Architecture Introduction White Paper (in Chinese). http://developers.sun.com.cn/blog/functionalca/resource/sun_353cloudcomputing_chinese.pdf.
[3] Barroso LA, Dean J, Holzle U. Web search for a planet: The Google cluster architecture. IEEE Micro, 2003,23(2):22−28.
[4] International Telegraph Union (ITU) (in Chinese). http://www.itu.int/en/pages/default.aspx.
[5] Organization for the Advancement of Structured Information Standards (OASIS) (in Chinese). http://www.oasis-open.org/.
[6] Distributed Management Task Force (DMTF) (in Chinese). http://www.dmtf.org/home.
[7] Cloud Security Alliance (in Chinese). http://www.cloudsecurityalliance.org.
[8] Crampton J, Martin K, Wild P. On key assignment for hierarchical access control. In: Guttan J, ed, Proc. of the 19th IEEEComputer Security Foundations Workshop—CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5−7.
[9] Damiani E, De S, Vimercati C, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategiesfor data outsourcing. In: Venter HS, Eloff MM, Labuschagne L, Eloff JHP, Solms RV, eds. New Approaches for Security, Privacyand Trust in Complex Environments, Proc. of the IFIP TC-11 22nd Int’l Information Security Conf. Sandton: Springer-Verlag,2007. 385−396.
[10] Goyal V, Pandey A, Sahai A, Waters B. Attribute-Based encryption for fine-grained access control of encrypted data. In: Juels A,Wright RN, Vimercati SDC, eds. Proc. of the 13th ACM Conf. on Computer and Communications Security, CCS 2006. Alexandria:ACM Press, 2006. 89−98.
[11] Bethencourt J, Sahai A, Waters B. Ciphertext-Policy attribute-based encryption. In: Shands D, ed. Proc. of the 2007 IEEE Symp. onSecurity and Privacy. Oakland: IEEE Computer Society, 2007. 321−334. [doi: 10.1109/SP.2007.11].
[12] Chang YC, Mitzenmacher M. Privacy preserving keyword searches on remote encrypted data. In: Ioannidis J, Keromytis AD, YungM, eds. LNCS 3531. New York: Springer-Verlag, 2005. 442−455.
[13] Malek B, Miri A. Combining attribute-based and access systems. In: Muzio JC, Brent RP, eds. Proc. IEEE CSE 2009, 12th IEEEInt’l Conf. on Computational Science and Engineering. IEEE Computer Society, 2009. 305−312.
[14] Ostrovsky R, Sahai A, Waters B. Attribute-Based encryption with non-monotonic access structures. In: Ning P, Vimercati SDC,Syverson PF, eds. Proc. of the 2007 ACM Conf. on Computer and Communications Security, CCS 2007. Alexandria: ACM Press,2007. 195−203.
[15] Yu S, Ren K, Lou W, Li J. Defending against key abuse attacks in KP-ABE enabled broadcast systems. In: Bao F, ed. Proc. of the5th Int’l Conf. on Security and Privacy in Communication Networks. Singapore: Springer-Verlag, http://www.linkpdf.com/ebook-viewer.php?url=http://www.ualr.edu/sxyu1/file/SecureComm09_AFKP_ABE.pdf.
[16] Hong C, Zhang M, Feng DG. AB-ACCS: A cryptographic access control scheme for cloud storage. Journal of Computer Researchand Development, 2010,47(Supplementary issue I):259−265 (in Chinese with English abstract).
[17] Boneh D, Franklin M. Identity-Based encryption from the Weil pairing. SIAM Journal on Computing, 2003,32(3):586−615.
[18] Ibraimi L, Petkovic M, Nikova S, Hartel P, Jonker W. Ciphertext-Policy attribute-based threshold decryption with flexibledelegation and revocation of user attributes. Technical Report, Centre for Telematics and Information Technology, University ofTwente, 2009.
[19] Roy S, Chuah M. Secure data retrieval based on ciphertext policy attribute-based encryption (CP-ABE) system for the DTNs.Technical Report, 2009.
[20] Goh EJ. Secure indexes. Technical Report, Stanford University, 2003. http://eprint.iacr.org/2003/216/.
[21] Chow R, Golle P, Jakobsson M, Shi E, Staddon J, Masuoka R, Molina J. Controlling data in the cloud: Outsourcing computationwithout outsourcing control. In: Sion R, ed. Proc. of the 2009 ACM Workshop on Cloud Computing Security, CCSW 2009,Co-Located with the 16th ACM Computer and Communications Security Conf., CCS 2009. New York: Association for ComputingMachinery, 2009. 85−90. [doi: 10.1145/1655008.1655020].
[22] Song D, Wagner D, Perrig A. Practical techniques for searches on encrypted data. In: Titsworth FM, ed. Proc. of the IEEEComputer Society Symp. on Research in Security and Privacy. Piscataway: IEEE, 2000. 44−55.
[23] Boneh D, Crescenzo G, Ostrovsky R, Persiano G. Public key encryption with keyword search. In: Cachin C, Camenisch J, eds.LNCS 3027. Heidelberg: Springer-Verlag, 2004. 506−522.
[24] Gentry C. Fully homomorphic encryption using ideal lattices. In: Mitzenmacher M, ed. Proc. of the 2009 ACM Int’l Symp. onTheory of Computing. New York: Association for Computing Machinery, 2009. 169−178.
[25] Juels A, Kaliski B. Pors: Proofs of retrievability for large files. In: Ning P, Vimercati SDC, Syverson PF, eds. Proc. of the 2007ACM Conf. on Computer and Communications Security, CCS 2007. Alexandria: ACM Press, 2007. 584−597.
[26] Ateniese G, Burns R, Curtmola R. Provable data possession at untrusted stores. In: Ning P, Vimercati SDC, Syverson PF, eds. Proc.of the 2007 ACM Conf. on Computer and Communications Security, CCS 2007. Alexandria: ACM Press, 2007. 598−609.
[27] Di Pietro R, Mancini LV, Ateniese G. Scalable and efficient provable data possession. In: Levi A, ed. Proc. of the 4th Int’l Conf. onSecurity and Privacy in Communication Netowrks. Turkey: ACM DL, 2008. http://eprint.iacr.org/2008/114.pdf [doi: 10.1145/1460877.1460889].
[28] Zeng K. Publicly verifiable remote data integrity. In: Chen LQ, Ryan MD, Wang GL, eds. LNCS 5308. Birmingham:Springer-Verlag, 2008. 419−434.
[29] Yun A, Shi C, Kim Y. On protecting integrity and confidentiality of cryptographic file system for outsourced storage. In: Sion R,ed. Proc. of the 2009 ACM Workshop on Cloud Computing Security, CCSW 2009, Co-Located with the 16th ACM Computer andCommunications Security Conf., CCS 2009. New York: Association for Computing Machinery, 2009. 67−76.
[30] Schwarz T, Ethan SJ, Miller L. Store, forget, and check: Using algebraic signatures to check remotely administered storage. In:Proc. of the 26th IEEE Int’l Conf. on Distributed Computing Systems. IEEE Press, 2006. 12−12. [doi: 10.1109/ICDCS.2006.80].
[31] Wang Q, Wang C, Li J, Ren K, Lou W. Enabling public verifiability and data dynamics for storage security in cloud computing. In:Backes M, Ning P, eds. LNCS 5789. Heidelberg: Springer-Verlag, 2009. 355−370.
[32] Roy I, Ramadan HE, Setty STV, Kilzer A, Shmatikov V, Witchel E. Airavat: Security and privacy for MapReduce. In: Castro M,eds. Proc. of the 7th Usenix Symp. on Networked Systems Design and Implementation. San Jose: USENIX Association, 2010.297−312.
[33] Bowers KD, Juels A, Oprea A. Proofs of retrievability: Theory and implementation. In: Sion R, ed. Proc. of the 2009 ACMWorkshop on Cloud Computing Security, CCSW 2009, Co-Located with the 16th ACM Computer and Communications SecurityConf., CCS 2009. New York: Association for Computing Machinery, 2009. 43−54. [doi: 10.1145/1655008.1655015].
[34] Muntés-Mulero V, Nin J. Privacy and anonymization for very large datasets. In: Chen P, ed. Proc of the ACM 18th Int’l Conf. onInformation and Knowledge Management, CIKM 2009. New York: Association for Computing Machinery, 2009. 2117−2118. [doi:10.1145/1645953.1646333]
[35] Raykova M, Vo B, Bellovin SM, Malkin T. Secure anonymous database search. In: Sion R, ed. Proc. of the 2009 ACM Workshopon Cloud Computing Security, CCSW 2009, Co-Located with the 16th ACM Computer and Communications Security Conf., CCS2009. New York: Association for Computing Machinery, 2009. 115−126. [doi: 10.1145/1655008.1655025].
[36] Elangop S, Dusseauaetal A. Deploying virtual machines as sandboxes for the grid. In: Karp B, ed. USENIX Association Proc. ofthe 2nd Workshop on Real, Large Distributed Systems. San Francisco, 2005. 7−12.
[37] Raj H, Nathuji R, Singh A, England P. Resource management for isolation enhanced cloud services. In: Sion R, ed. Proc. of the2009 ACM Workshop on Cloud Computing Security, CCSW 2009, Co-Located with the 16th ACM Computer and CommunicationsSecurity Conf., CCS 2009. New York: Association for Computing Machinery, 2009. 77−84. [doi: 10.1145/1655008.1655019].
[38] Wei J, Zhang X, Ammons G, Bala V, Ning P. Managing security of virtual machine images in a cloud environment. In: Sion R, ed.Proc. of the 2009 ACM Workshop on Cloud Computing Security, CCSW 2009, Co-Located with the 16th ACM Computer andCommunications Security Conf., CCS 2009. New York: Association for Computing Machinery, 2009. 91−96. [doi: 10.1145/1655008.1655021].
原文网址:http://www.pipcn.com/research/201211/15175.htm
也许您还喜欢阅读: