-
1
-
-
79951999348
-
Study on cloud computing Security
-
FENG D G, ZHANG M, ZHANG Y, et al. Study on cloud computing Security [J]. Journal of Software, 2011, 22 (1): 71-83.
-
(2011)
Journal of Software
, vol.22
, Issue.1
, pp. 71-83
-
-
Feng, D.G.1
Zhang, M.2
Zhang, Y.3
-
2
-
-
78649457543
-
Conjunct model of cloud & client computing based on multi-agent
-
XU X L, CHENG C L, XIONG J Y. Conjunct model of cloud & client computing based on multi-agent [J]. Journal on Communications, 2010, 31 (10): 203-211.
-
(2010)
Journal on Communications
, vol.31
, Issue.10
, pp. 203-211
-
-
Xu, X.L.1
Cheng, C.L.2
Xiong, J.Y.3
-
3
-
-
77955712658
-
Toward dynamic and attribute based publication, discovery and selection for cloud computing
-
GOSCINSKI A, BROCK M. Toward dynamic and attribute based publication, discovery and selection for cloud computing [J]. Future Generation Computer Systems, 2010, 26 (7): 947-970.
-
(2010)
Future Generation Computer Systems
, vol.26
, Issue.7
, pp. 947-970
-
-
Goscinski, A.1
Brock, M.2
-
4
-
-
65749084065
-
Cloud computing: System instances and current research
-
CHEN K, ZHENG W M. Cloud computing: system instances and current research [J]. Journal of Software, 2009, 20 (5): 1337-1348.
-
(2009)
Journal of Software
, vol.20
, Issue.5
, pp. 1337-1348
-
-
Chen, K.1
Zheng, W.M.2
-
5
-
-
77950572596
-
Server transparent query authentication of outsourced database
-
ZHANG M, HONG C, CHEN C. Server transparent query authentication of outsourced database [J]. Journal of Computer Research and Development, 2010, 47 (1): 182-190.
-
(2010)
Journal of Computer Research and Development
, vol.47
, Issue.1
, pp. 182-190
-
-
Zhang, M.1
Hong, C.2
Chen, C.3
-
7
-
-
74049103479
-
Pors: Proofs of retrievability for large files
-
Alexandria, VA, USA
-
JUELS A, KALISKI B. Pors: proofs of retrievability for large files [A]. Proceedings of CCS 2007 [C]. Alexandria, VA, USA, 2007. 584-597.
-
(2007)
Proceedings of CCS 2007
, pp. 584-597
-
-
Juels, A.1
Kaliski, B.2
-
8
-
-
74049102823
-
Provable data possession at untrusted stores
-
Alexandria, VA, USA
-
ATENIESE G, BURNS R, CURTMOLA R, et al. Provable data possession at untrusted stores [A]. Proceedings of CCS 2007 [C]. Alexandria, VA, USA, 2007. 598-609.
-
(2007)
Proceedings of CCS 2007
, pp. 598-609
-
-
Ateniese, G.1
Burns, R.2
Curtmola, R.3
-
9
-
-
58349118819
-
Compact proofs of retrievability
-
Melbourne, Australia
-
SHACHAM H, WATERS B. Compact proofs of retrievability [A]. Proceedings of ASIACRYPT 2008 [C]. Melbourne, Australia, 2008. 90-107.
-
(2008)
Proceedings of ASIACRYPT 2008
, pp. 90-107
-
-
Shacham, H.1
Waters, B.2
-
10
-
-
70249129465
-
Scalable and efficient provable data possession
-
Istanbul, Turkey
-
ATENIESE G, PIETRO D, MANCINI R, et al. Scalable and efficient provable data possession [A]. Proceedings of SecureComm 2008 [C]. Istanbul, Turkey, 2008. 1-10.
-
(2008)
Proceedings of SecureComm 2008
, pp. 1-10
-
-
Ateniese, G.1
Pietro, D.2
Mancini, R.3
-
12
-
-
9444241581
-
Study on authenticated dictionary and its applications in PKI
-
QING S H, ZHOU Y B, ZHANG Z F, et al. Study on authenticated dictionary and its applications in PKI [J]. Acta Electronica Sinica, 2004, 32 (8): 1356-1359.
-
(2004)
Acta Electronica Sinica
, vol.32
, Issue.8
, pp. 1356-1359
-
-
Qing, S.H.1
Zhou, Y.B.2
Zhang, Z.F.3
-
13
-
-
21044438930
-
A general model for authenticated data structures
-
MARTEL C, NUCKOLLS G, DEVANBU P, et al. A general model for authenticated data structures [J]. Algorithmica, 2004, 39 (1): 21-41.
-
(2004)
Algorithmica
, vol.39
, Issue.1
, pp. 21-41
-
-
Martel, C.1
Nuckolls, G.2
Devanbu, P.3
|