2Mell P, Grance T. The NIST Definition of Cloud Computing[R]. National Institute of Standards and Technology, Information Technology Laboratory, 2009. 被引量:1
4Cloud Security Alliance. Security Guidance for Critical Areas of Focus in Cloud Computing V3.0[R]. The Cloud Security Appliance,2011. 被引量:1
5Yan Liang, P, ong Chun- ming, Zhao Gan- sen. Strengthen cloud computing security with federal identity management using hierarchical identity- based cryptography[C]. In CloudCom' 09: Proceedings of the 1st International Conference on Cloud Computing, Beijing, China, 2009. 167- 177. 被引量:1
6Elisa Bertino, Federica Paci, P, odolfo Ferrini. Privacy-preserving Digital Identity Management for Cloud Computing[EB/OL]. http://www. uceresource.org/articles/Engineering/2009/BODE-09-vol-32-1-3.pdf, 2012-07-12. 被引量:1
7Ryan K L Ko, Peter Jagadpramana, Miranda Mowbray. et al.Trust Cloud: A Framework for Accountability and Trust in Cloud Computing[EB/OL]. http://www.hpl.hp.com/techreports/2011/ HPL-2011-38.pdf, 2011-06-22/2012-07-12. 被引量:1
8S. Chen and C. Wang, Accountability as a Service for the Cloud: From Concept to Implementation with BPEL[C]. Proc. 6th IEEE World Congress on Services(SERVICES-1),IEEE, 2010. 91-98. 被引量:1
9Centry C. A Fully Homorphic Encryption Scheme[D]. Stanford University, Califomia, September 2009. 被引量:1
10Jensen M, S S, SchwenkJ. Towards an Anonymous Access Control and Accountability Scheme for Cloud Computing[C]. The 3rd International Conference on Cloud Computing. Miami, Florida, USA, 2010. 540-541. 被引量:1