2POPA R A, LORCH J R, MOLNAR D, et al. Enabling security in cloud storage SLAs with Cloud-Proof[C]//USENIX Annual Technical Conference. Portland, Oregon, USA: USENIX Association, 2011(242): 355-368. 被引量:1
3ITANI W, A KAYSSI, CHEHAB A. Privacy as a service: Privacy-aware data storage and processing in cloud computing architectures[C]//Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing. New Jersey, USA: IEEE Computer Society, 2009: 711-716. 被引量:1
4RYAN M D. Cloud computing security: the scientific challenge, and a survey of solutions[J]. Journal of Systems and Software, 2013, 86(9): 2263-2268. 被引量:1
5JUELS A, KALISKI JR B S. PORs: Proofs of retrievability for large files[C]//14th ACM Conference on Computer and Communications Security. New York, USA: Association for Computing Machinery, 2007: 584-597. 被引量:1
6YAMAGUCHI T, HASHIYAMA T, OKUMA S. A study on reconfigurable computing system for cryptography[C]//2000 IEEE International Conference on in Systems, Man, and Cybernetics. New Jersey, USA: IEEE Computer Society, 2000: 2965-2968. 被引量:1
7KAMARA S, LAUTER K, Cryptographic cloud storage[C]//14th Financial Cryptograpy and Data Security International Conference. Berlin, Germany: Springer-Verlag, 2010: 136-149. 被引量:1
8ZHOU L, VARADHARAJAN V, HITCHENS M. Enforcing role-based access control for secure data storage in the cloud[J]. Computer Journal, 2011, 54(10): 1675-1687. 被引量:1
10LEKKAS D, GRITZALIS S, KATSIKAS S. Quality assured trusted third parties for deploying secure internet-based healthcare applications[J]. International Journal of Medical Informatics, 2002, 65(2): 79-96. 被引量:1