[1] CBNweekly. Report: looking for the value-added of the mobile world [EB/OL]. [2013-01-18]. http://www.yicai.com/news/2013/01/2428793.html.(第一财经周刊.报告:寻找移动互联世界的附加值[EB/OL]. [2013-01-18]. http://www.yicai.com/news/2013/01/2428793.html.) [2] ENCK W, GILBERT P, CHUN B-G, et al. TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones [C]// OSDI'10: Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation. Berkeley: USENIX Association, 2010: 255-270. [3] CHENG Y, YING L, JIAO S, et al. Research on user privacy leakage in mobile social messaging applications [J]. Chinese Journal of Computers, 2014, 37(1): 87-100.(程瑶,应凌云,焦四辈,等.移动社交应用的用户隐私泄漏问题研究[J].计算机学报,2014,37(1):87-100.) [4] Wikipedia. PRISM [EB/OL]. [2014-03-04]. http://en.wikip-edia.org/wiki/PRISM. [5] Sohu IT. Users' information were sold by MySpace, and their privacy rights will be threatened [EB/OL]. [2014-03-18]. http://it.sohu.com/20100318/n270924241.shtml.(搜狐IT. MySpace出售用户信息,威胁用户隐私权益[EB/OL]. [2014-03-18]. http://it.sohu.com/20100318/n270924241.shtml.) [6] InfoWorld. Deleted cloud files can be recovered from smartphones, researchers find [EB/OL]. [2013-03-19]. http://www.infoworld.com/t/mobile-security/deleted-cloud-files-can-be-recovered-smart-phones-researchers-find-214779. [7] GEAMBASU R, KOHNO T, LEVY A, et al. Vanish: increasing data privacy with self-destructing data [C]// SSYM'09: Proceedings of the 18th USENIX Security Symposium. Berkeley: USENIX Association, 2009: 299-315. [8] WANG G, YUE F, LIU Q. A secure self-destructing scheme for electronic data [J]. Journal of Computer and System Sciences, 2013, 79(2): 279-290. [9] XIONG J, YAO Z, MA J, et al. A secure self-destruction scheme with IBE for the Internet content privacy [J]. Chinese Journal of Computers, 2014, 37(1): 139-150.(熊金波,姚志强,马建峰,等.面向网络内容隐私的基于身份加密的安全自毁方案[J].计算机学报,2014,37(1):139-150.) [10] TANG Y, AMES P, BHAMIDIPATI S, et al. CleanOS: limiting mobile data exposure with idle eviction [C]// OSDI'12: Proceedings of the 10th USENIX Conference on Operating Systems Design and Implementation. Berkeley: USENIX Association: 2012: 77-91. [11] DAI J, ZHANG C, LI Z. A cryptographic and time-constraint access control scheme for mobile terminals [M]// Network Computing and Information Security. Berlin: Springer, 2012: 352-357. [12] TUNG T, LIN L, LEE D. Pandora messaging: an enhanced self-message-destructing secure instant messaging architecture for mobile devices [C]// WAINA 2012: Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops. Piscataway: IEEE, 2012: 720-725. [13] SHAMIR A. How to share a secret [J]. Communications of the ACM, 1979, 22(11): 612-613. [14] WELCH T A. A technique for high-performance data compression [J]. IEEE Computer, 1984, 17(6):8-18. [15] WANG L, REN Z, YU R, et al. A data assured deletion approach adapted for cloud storage [J]. Acta Electronica Sinica, 2012, 40(2): 266-272.(王丽娜,任正伟,余荣威,等.一种适于云存储的数据确定性删除方法[J].电子学报,2012,40(2):266-272.) [16] LIU J, LI W, SUN Y. Security issues and solutions on social networks [J]. Journal of University of Science and Technology of China, 2011, 41(7): 565-575.(刘建伟,李为宇,孙钰.社交网络安全问题及其解决方案[J].中国科学技术大学学报,2011,41(7):565-575.) [17] BWACH A, GARTRELL M, HAN R. Social-K: real-time K-anonymity guarantees for social network applications [C]// PerCom 2010: Proceedings of the 8th Annual IEEE International Conference on Pervasive Computing and Communications. Piscataway: IEEE, 2010: 600-606. [18] BWACH A, GARTRELL M, HAN R. Solutions to security and privacy issues in mobile social networking [C]// CSE'09: Proceedings of the 2009 International Conference on Computational Science and Engineering. Piscataway: IEEE, 2009: 1036-1042. [19] ZHANG T, CHEN T. An energy-efficient cloud-based offloading decision algorithm for mobile devices [J]. SCIENTIA SINICA: Informationis, 2012, 42(3): 333-342.(章铁飞,陈天洲.基于移动设备云迁移的节能决策算法[J].中国科学:信息科学,2012,42(3):333-342.) [20] XIONG J, YAO Z, MA J, et al. A secure self-destruction scheme for composite documents with attribute based encryption [J]. Acta Electronica Sinica, 2014, 42(2): 366-376.(熊金波,姚志强,马建峰,等.基于属性加密的组合文档安全自毁方案[J].电子学报,2014,42(2):366-376.) |