参考文献
|
-
Microsoft SkyDrive, https://login.live.com/login.srf?
-
Oracle White Paper, Information Lifecycle Management for Business Data, http://www.oracle.com/, June 2007
-
Anti-Phishing Working Group, Inc. http://www.antiphishing.org, 2012
-
Google 雲端硬碟,https://www.google.com.tw/
-
Cloud Security Alliance, Security Guidance for Critical Areas of Focus in Cloud Computing V3.0, Nov. 2011..
-
Dropbox, https://www.dropbox.com/
-
Chu, C.-K.,Zhu, W.-T.,Han, J.,Liu, J. K.,Jia, X.,Zhou, J. Y.(2013).Security Concerns in Popular Cloud Storage Services.IEEE Pervasive Computing,12(4),50-57.
-
Hayes, B.(2008).Cloud computing.Communications of the ACM,51(7),9-11.
-
Huang, X.,Zhang, T.,Hou, Y.(2009).ID Management among Clouds.2009 First International Conference on Future Information Networks
-
Hur, Junbeom(2013).Improving Security and Efficiency in Attribute-Based Data Sharing.IEEE Transactions on Knowledge and Data Engineering,25(10),2271-2282.
-
Hwang, K.,Kulkareni, S.,Hu, Y.(2009).Cloud Security with Virtualized Defense and Reputation-Based Trust Management.IEEE International Conference on DASC '09
-
Jensen, M.,Schwenk, J.,Gruschka, N.,Iacono, L.L.(2009).On Technical Security Issues in Cloud Computing.IEEE International Conference on Cloud Computing
-
Kao, Y.-W.,Huang, K.-Y.,Gu, H.-Z.,Yuan, S.-M.(2013).uCloud: a user-centric key management scheme for cloud data protection.IET Information Security,7(2),144-154.
-
Kaufman, L. M.(2009).Data Security in the World of Cloud Computing.IEEE Security & Privacy,7(4),61-64.
-
Li, H.,Dai, Y.,Tian, L.,Yang, H.(2009).Identity-Based Authentication for Cloud Computing.CloudCom 2009
-
Liu, X.,Zhang, Y.,Wang, B.,Yan, J.(2013).Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud.IEEE Transactions on Parallel and Distributed Systems,24(6),1182-1191.
-
Sun Microsystems Inc.(2009).Introduction to Cloud Computing architecture White Paper.
-
Sundareswaran, S.,Squicciarini, A. C.,Lin, D. E.(2012).Distributed Accountability for Data Sharing in the Cloud.IEEE Transactions on Dependable and Secure Computing,9(4),556-568.
-
Wang, C.,Chow, S.S.M.,Wang, Q.,Ren, K.,Lou, W.J.(2013).Privacy-Preserving Public Auditing for Secure Cloud Storage.IEEE Transactions on Computers,62(2),362-375.
-
Wang, C.,Wang, Q.,Ren, K.,Lou, W.(2009).Ensuring data storage security in Cloud Computing.17th International Workshop on Quality of Service
-
Weiss, A.(2007).Computing in the Clouds.Net Worker,11(4),16-25.
-
Yildiz, M.,Abawajy, J.,Ercan, T.,Bernoth, A.(2009).A Layered Security Approach for Cloud Computing Infrastructure.2009 10th International Symposium on ISPAN
-
Yu, X.,Wen, Q.(2010).A View about Cloud Data Security from Data Life Cycle.Proc of CISE
|