[1]LIN C, SU W, MENG K,et al. Cloud computing security: architecture, mechanism and modeling[J].Chinese Journal of Computers, 2013, 36(9): 1765-1784.(林闯, 苏文博, 孟坤, 等. 云计算安全: 架构, 机制与模型评价[J]. 计算机学报, 2013, 36(9):1765-1784.)
[2]LAWTON G. New technology prevents data leakage[J]. Computer, 2008, 41(9): 14-17.
[3]YOSHIHAMA S, MISHINA T, MATSUMOTO T. Web-based data leakage prevention[C]// Proceedings of the 5th International Workshop on Security. Piscataway: IEEE, 2010: 78-93.
[4]HONG C, ZHANG M, FENG D. Achieving efficient dynamic cryptographic access control in cloud storage[J]. Journal on Communications, 2011, 32(7): 125-131.(洪澄, 张敏, 冯登国. 面向云存储的高效动态密文访问控制方法[J]. 通信学报, 2011, 32(7): 125-131.)
[5]WANG Z, WANG Q. Practical control on sensitive data propagation of cloud computing[J]. China Information Security, 2013(8): 85-87.(王志文, 王强. 云计算敏感数据防泄露技术研究[J]. 信息安全与通信保密, 2013(8): 85-87.)
[6]CHEN J. Network security data transfer method research based on cloud computing[J]. Computer Simulation, 2012, 29(8): 139-141.(陈牮华. 基于云计算的网络安全数据传递方法研究[J]. 计算机仿真, 2012, 29(8): 139-141.)
[7]SCHEAR N, KINTANA C, ZHANG Q, et al. Glavlit: Preventing exfiltration at wire speed[J]. Irvine Is Burning, 2012,12(5): 133-140.
[8]YUMEREFENDI A R, MICKLE B, COX L P. TightLip: Keeping applications from spilling the beans[C]// Proceedings of the 9th USENIX Symposium on Networked Systems and Design and Implementation. Berkeley: USENIX Association, 2012: 289-296.
[9]KLONOWSKI M, KOZA M, KUTYLOWSKI M. Efficient and robust data aggregation using untrusted infrastructure[C]// Proceedings of the 6th International Conference on Security of Information and Networks. New York: ACM, 2013: 123-130.
[10]MITZENMACHER M. Compressed bloom filters[J]. IEEE/ACM Transactions on Networking, 2002, 10(5): 604-612.
[11]HAO F, KODIALAM M, LAKSHMAN T V. Building high accuracy bloom filters using partitioned hashing[J]. ACM SIGMETRICS Performance Evaluation Review, 2007, 35(1): 277-288.
[12]PUTTASWAMY K P N, SALA A, ZHAO B Y. Starclique: Guaranteeing user privacy in social networks against intersection attacks[C]// Proceedings of the 5th International Conference on Emerging Networking Experiments and Technologies. New York: ACM, 2009: 157-168.
[13]PUTTASWAMY K P N, MARSHALL C C, RAMASUBRAMANIAN V, et al. Docx2Go: collaborative editing of fidelity reduced documents on mobile devices[C]// Proceedings of the 8th International Conference on Mobile Systems, Applications, and Services. New York: ACM, 2010: 345-356. |