参考文献:
[1]俞能海,郝卓,徐甲甲,等. 云安全研究进展综述[J]. 电子学报, 2013,41(2): 371-381.
[2]Ferraiolo D F, Kuhn D R. Rolebased access controls[C]// The 15th National Computer Security Conference. 1992:554-563.
[3]Bethencourt J, Sahai A, Waters B. Ciphertextpolicy attributebased encryption[C]// Proc. of the 2007 IEEE Symp. on Security and Privacy. 2007:321-334.
[4]李凤华,苏铓,史国振,等. 访问控制模型研究进展及发展趋势[J]. 电子学报, 2012,40(4): 805-813.
[5]韩道军,高洁,翟浩良,等. 访问控制模型研究进展[J]. 计算机科学, 2010, 37(11): 29-33,43.
[6]Fugkeaw S, Manpanpanich P, Juntapremjitt S. Achieving DRBAC authorization in multi-trust domains with MAS architecture and PMI[M]// Agent Computing and Multi-Agent Systems. 2009: 339-348.
[7]王小威,赵一鸣. 一种基于任务角色的云计算访问控制模型[J]. 计算机工程, 2012, 38(24):9-13.
[8]苏金树,曹丹,王小峰,等. 属性基加密机制[J].软件学报, 2011, 22(6):1299-1315.
[9]Ibraimi L, Asim M, Petkovic M. An encryption scheme for a secure policy updating[C]// Proceedings of the 2010 International Conference on SECRYPT. 2010: 1-10.
[10]Wang G, Liu Q, Wu J. Hierarchical attributebased encryption for finegrained access control in cloud storage services[C]// Proceedings of the 17th ACM Conference on Computer and Communications Security. 2010: 735-737.
[11]洪澄, 张敏,冯登国. 面向云存储的高效动态密文访问控制方法[J]. 通信学报, 2011, 32(7): 125-132.
[12]孙国梓,董宇, 李云. 基于 CPABE 算法的云存储数据访问控制[J]. 通信学报, 2011, 32(7): 146-152.
[13]洪澄,张敏,冯登国.ABACCS:一种云存储密文访问控制方法[J]. 计算机研究与发展,2010,47(S1):259-265.
[14]金山软件公司. 金山快盘产品说明[DB/OL]. http://e.kuaipan.cn/ product.html, 2013-10-16. |