[1] QIU M, GAI K, THURAISINGHAM B, et al. Proactive user-centric secure data scheme using attribute-based semantic access controls for mobile clouds in financial industry[J]. Future Generation Computer Systems, 2018, 80:421-429. [2] GAI K, LI S. Towards cloud computing:a literature review on cloud computing and its development trends[C]//Proceedings of the 4th International Conference on Multimedia Information Networking and Security. Piscataway:IEEE, 2012:142-146. [3] GAI K, QIU M, CHEN L C, et al. Electronic health record error prevention approach using ontology in big data[C]//Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, IEEE 7th International Symposium on Cyberspace Safety and Security, IEEE 12th International Conference on Embedded Software and Systems. Piscataway:IEEE, 2015:752-757. [4] YU S, ZHOU W, DOSS R, et al. Traceback of DDoS attacks using entropy variations[J]. IEEE Transactions on Parallel and Distributed Systems, 2011, 22(3):412-425. [5] LI Y, DAI W, MING Z, et al. Privacy protection for preventing data over-collection in smart city[J]. IEEE Transactions on Computers, 2016, 65(5):1339-1350. [6] 卢笛,马建峰,王一川,等.面向云计算环境的动态公平性度量方法[J].通信学报,2014,35(7):140-150. (LU D, MA J F, WANG Y C, et al. Dynamic fairness evaluation framework for cloud computing[J]. Journal on Communications, 2014, 35(7):140-150.) [7] 马莉,唐善成,王静,等. 云计算环境下的动态反馈作业调度算法[J]. 西安交通大学学报, 2014, 48(7):77-82. (MA L, TANG S C, WANG J, et al. Dynamic feedback job scheduling algorithm in cloud computing[J]. Journal of Xi'an Jiaotong University, 2014, 48(7):77-82.) [8] 倪志伟,李蓉蓉,方清华,等. 基于离散人工蜂群算法的云任务调度优化[J]. 计算机应用, 2016, 36(1):107-112, 121. (NI Z W, LI R R, FANG Q H, et al. Optimization of cloud task scheduling based on discrete artificial bee colony algorithm[J]. Journal of Computer Applications, 2016, 36(1):107-112, 121.) [9] BLANTON M, ALIASGARI M. Secure outsourcing of DNA searching via finite automata[C]//Proceedings of the 2010 IFIP Annual Conference on Data and Applications Security and Privacy, LNCS 6166. Berlin:Springer, 2010:49-64. [10] ATALLAH M J, KERSCHBAUM F, DU W. Secure and private sequence comparisons[C]//Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society. New York:ACM, 2003:39-44. [11] ATALLAH M J, LI J. Secure outsourcing of sequence comparisons[J]. International Journal of Information Security, 2005, 4(4):277-287. [12] VAN DIJK M, GENTRY C, HALEVI S, et al. Fully homomorphic encryption over the integers[C]//Proceedings of the 2010 International Conference on the Theory and Applications of Cryptographic Techniques, LNCS 6110. Berlin:Springer, 2010:24-43. [13] DE CAPITANI DI VIMERCATI S, FORESTI S, JAJODIA S, et al. Over-encryption:management of access control evolution on outsourced data[C]//Proceedings of the 33rd International Conference on Very Large Data Bases.[S.l.]:VLDB Endowment, 2007:123-134. [14] WENG L, AMSALEG L, MORTON A, et al. A privacy-preserving framework for large-scale content-based information retrieval[J]. IEEE Transactions on Information Forensics and Security, 2014, 10(1):152-167. [15] YU S, ZHOU W, JIA W, et al. Discriminating DDoS attacks from flash crowds using flow correlation coefficient[J]. IEEE Transactions on Parallel and Distributed Systems, 2012, 23(6):1073-1080. [16] LI Y, GAI K, QIU L, et al. Intelligent cryptography approach for secure distributed big data storage in cloud computing[J]. Information Sciences, 2016, 387:103-115. [17] 蔡岳平,张文鹏,罗森. 基于最小接入保证带宽的数据中心网络带宽分配机制[J]. 计算机应用, 2017, 37(7):1825-1829. (CAI Y P, ZHANG W P, LUO S. Minimum access guaranteed bandwidth allocation mechanism in data center network[J]. Journal of Computer Applications, 2017, 37(7):1825-1829.) [18] 徐珊珊. 工业控制系统轻量级数据安全传输的研究[D]. 杭州:浙江大学, 2016:38-62. (XU S S. Research on the safe transmission of lightweight data in industrial control system[D]. Hangzhou:Zhejiang University, 2016:38-62.) [19] 刘建,鲜明,王会梅,等. 面向移动云的属性基密文访问控制优化方法[J]. 通信学报, 2018, 39(7):39-49. (LIU J, XIAN M, WANG H M, et al. Optimization method for attribute-based cryptographic access control in mobile cloud computing[J]. Journal on Communications, 2018, 39(7):39-49.) [20] 蒋明达. 移动云环境下数据安全保护机制研究与实现[D]. 重庆:重庆邮电大学, 2017:24-38. (JIANG M D. Research and implementation of data security protection in mobile cloud environment[D]. Chongqing:Chongqing University of Posts and Telecommunications, 2017:24-38.) [21] GAI K, STEENKAMP A. A feasibility study of platform-as-a-service using cloud computing for a global service organization[J]. Journal of Information Systems Applied Research, 2014, 7(3):28-42. [22] LI K, ZHANG W, YANG C, et al. Security analysis on one-to-many order preserving encryption-based cloud data search[J]. IEEE Transactions on Information Forensics and Security, 2015, 10(9):1918-1926. [23] CICCONETTI C, LENZINI L, LODI A, et al. Efficient two-dimensional data allocation in IEEE 802.16 OFDMA[J]. IEEE/ACM Transactions on Networking, 2014, 22(5):1645-1658. [24] VIDYASAGAR M. A metric between probability distributions on finite sets of different cardinalities and applications to order reduction[J]. IEEE Transactions on Automatic Control, 2012, 57(10):2464-2477. [25] GAI K, QIU M, ZHAO H, et al. Privacy-aware adaptive dataencryption strategy of big data in cloud computing[C]//Proceedings of the IEEE 3rd International Conference on Cyber Security and Cloud Computing. Piscataway:IEEE, 2016:273-278. |