Jung Y,Chung M.Adaptive security management model in the cloud computing environment[A].Proceedings of the 12th International Conference on Advanced Communication Technology[C].Washington DC:IEEE Press,2010.1664-1669.
[11]
Bethencourt J,Sahai A,Waters B.Ciphertext-policy attribute-based encryption[A].Proceedings of the 2007 IEEE Symposium on Security and Privacy[C].Berkeley:IEEE Press,2007.321-334.
[12]
Yu S,Wang C,Ren K,et al.Achieving secure,scalable,and fine-grained data access control in cloud computing[A].Proceedings of IEEE INFORCOM 2010[C].San Diego,CA:IEEE Press,2010.1-9.
[13]
陈丹伟,邵菊,樊晓唯,等.基于MAH-ABE的云计算隐私保护访问控制[J].电子学报,2014,42(4):821-827. Chen Danwei,Shao Ju,Fan Xiaowei,et al.MAH-ABE based privacy access control in cloud computing[J].Acta Electronica Sinica,2014,42(4):821-827.(in Chinese)
[14]
Ren K,Wang C,Wang Q.Security challenges for the public cloud[J].IEEE Internet Computing,2012,16 (1):69-73.
[15]
Takabi H,Joshi J B D,Ahn G.Security and privacy challenges in cloud computing environments[J].Security & Privacy,IEEE,2010,8(6):24-31.
[16]
Ronald L,Russell D.Cloud Security:A Comprehensive Guide to Secure Cloud Computing[M].Wiley Publishing,Inc.,2010.
[17]
罗军舟,金嘉晖,宋爱波,等.云计算:体系架构与关键技术[J].通信学报,2011,32(7):3-21. Luo Junzhou,Jing Jiahui,Song Aibo,et al.Cloud computing:architecture and key technologies[J].Journal on Communications,2011,32(7):3-21.(in Chinese)
Tim M,Subra K,Shahed L.Cloud Security and Privacy[M].O''Reilly Media,Inc,2009.
[20]
Cloud security alliance.Guidance for identity & access management V2.1[EB/OL].http://www.cloudsecurityalliance.org/guidance/csaguide-dom12-v2.10.pdf,2012.
[21]
Chandran S M,Joshi J B D.Towards administration of a hybrid role hierarchy[A].Proceedings of the 2005 International Conference on Information Reuse and Integration[C].Las Vegas:IEEE Press,2005.500-505.
[22]
Bertino E,Bonatti P A,Ferrari E.TRBAC:a temporal role-based access control model[J].ACM Transactions on Information and Systems Security,2001,4(3):191-223.
[23]
Du S,Joshi J B D.Supporting authorization query and inter-domain role mapping in presence of hybrid role hierarchy[A].Proceedings of the 2006 ACM Symposium on Access Control Models and Technologies[C].Lake Tahoe:ACM Press,2006.228-236.
[24]
杨柳,唐卓,李仁发,等.云计算环境中基于用户访问需求的角色查找算法[J].通信学报,2011,32(7):169-175. Yang Liu,Tang Zhuo,Li Renfa,et al.Roles query algorithm in cloud computing environment based on user require[J].Journal on Communications,2011,32(7):169-175.(in Chinese)
[25]
林果园,贺珊,黄皓,等.基于行为的云计算访问控制安全模型[J].通信学报,2013,33(3):59-66.(in Chinese) Lin Guoyuan,He Shan,Huang Hao,et al.Access control security model based on behavior in cloud computing environment[J].Journal on Communications,2013,33(3):59-66.(in Chinese)
[26]
Sahai A,Waters B.Fuzzy identity-based encryption[A].Proceedings of Eurocrypt 2005[C].Berlin,2005.457-473.
[27]
Goyal V,Pandey,O,Sahai A,et al.Attribute based encryption for fine-grained access control of encryption security data[A].Proceedings of the 2006 ACM conference on Computer and Communications Security[C].Alexandria,Virginia,USA:ACM Press,2006.89-98.
[28]
Kamara S, Lauter K.Cryptographic cloud storage[A].Proceedings of the 14th international conference on Financial cryptography and data security[C].Berlin,Germany,2010.136-149.
[29]
Wang W,Li Z,Owens R,et al.Secure and efficient access to outsourced data[A].Proceedings of the ACM Workshop on Cloud Computing Security[C].Chicago,USA,2009.55-66.
[30]
Abdulrahman A A,Muhammad I S,Saleh B,et al.A distributed access control architecture for cloud computing[J].IEEE Software,2012,29(2):36-44.