期刊文献+

电子商务中云计算的安全及关键技术分析 被引量:1

下载PDF
导出
摘要 电子商务是指在互联网、增值网或者企业内部使用电子交易的方式进行交易活动和相关服务活动。随着电子商务被普遍使用,其为用户提供的选择也越来越多,也使其变得更为复杂。随着云计算技术近几年的逐渐兴起,云计算技术逐渐与电子商务结合起来,本文主要探讨电子商务中云计算的安全及关键技术。
作者 杨莉
出处 《科技传播》 2014年第9期218-219,共2页 Public Communication of Science & Technology
  • 相关文献

参考文献3

二级参考文献18

  • 1Dignan L. Cloud computing hasn't gone fortune 500 yet, but it's coming[EB/OL]. [2011-04]. http://blogs.zdnet.com/ BTL/?p=8199. 被引量:1
  • 2Shamir A. Identity-based cryptosystems and signature schemes[C]//LNCS 196: Proceedings of the Advances in Cryptology (CRYPTO), 1985. Berlin, Heidelberg: Springer- Verlag, 1985: 47-53. 被引量:1
  • 3Boneh D, Franklin M. Identity-based encryption from the Weil pairing[C]//Proceedings of the Advances in Cryptology (CRYPTO), 2001. Berlin, Heidelberg: Springer- Veflag, 2001: 213-229. 被引量:1
  • 4Sahai A, Waters B. Fuzzy identity based encryption[C]// Proceedings of the Advances in Cryptology (EUROCRYPT), Aarhus, Denmark, 2005. Berlin, Heidelberg: Springer- Verlag, 2005: 457--473. 被引量:1
  • 5Goyal V, Pandey O, Sahai A, et al. Attribute based encryption for fine-grained access control of encrypted data[C]//Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS '06). New York, NY, USA: ACM, 2006: 89-98. 被引量:1
  • 6Bethencourt J, Sahai A, Waters B. Ciphertext-policy attribute-based encryption[C]//Proceedings of the 2007 IEEE Symposium on Security and Privacy, Oakland, California, USA, 2007. Washington, DC, USA: IEEE Computer Society, 2007: 321-334. 被引量:1
  • 7Liang Xiaohui, Cao Zhenfu, Lin Huang, et al. Attribute based proxy re-encryption with delegating capabilities[C]//Proceedings of the 4th International Symposium on Information, Computer and Communications Security (ASIACCS 2009). New York, NY, USA: ACM, 2009: 276-286. 被引量:1
  • 8Hong Cheng, Zhang Min, Feng Dengguo. AB-ACCS: a cryptographic access control scheme for cloud storage[J]. Journal of Computer Research and Development, 2010, 47(Suppl): 259-265. 被引量:1
  • 9Pirretti M, Traynor P, McDaniel P, et al. Secure atrribute-based systems[C]//Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS '06). New York, NY, USA" ACM, 2006: 99-112. 被引量:1
  • 10Yu Shucheng, Wang Cong, Ren Kui, et al. Attribute based data sharing with attribute revocation[C]//Proceedings of the 5th International Symposium on Information, Computer and Communications Security (ASIACCS 2010). New York, NY, USA: ACM, 2010: 261-270. 被引量:1

共引文献34

同被引文献4

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部