[1] XIONG J B, LIU X M, YAO Z Q, et al. A secure data self-destructing scheme in cloud computing [J]. IEEE Transactions on Cloud Computing, 2014, 2(4): 448-458. [2] XIONG J B, LI F H, MA J F, et al. A full lifecycle privacy protection scheme for sensitive data in cloud computing[J]. Peer-to-Peer Networking and Applications, 2015, 8(6): 1025-1037. [3] PERLMAN R. File system design with assured delete[C]//Proceedings of the 3rd IEEE International Security in Storage Workshop. Piscataway, NJ: IEEE, 2005:83-88. [4] YANG T, LEE P P, LUI J C, et al. FADE: secure overlay cloud storage with file assured deletion[C]//Proceedings of the 2010 International Conference on Security and Privacy in Communication Systems. Berlin: Springer, 2010: 380-397. [5] NAIR S K, DASHTI M T, CRISPO B, et al. A hybrid PKI-IBC base ephemerizer system[C]//Proceedings of the 2007 International Information Security Conference. Berlin: Springer, 2007:241-252. [6] GEAMBASU R, KOHNO T, LEVY A, et al. Vanish: increasing data privacy with self-destruction data[C]//Proceedings of the 18th USENIX Security Symposium. Berkeley: USENIX, 2009:299-355. [7] XIONG J B, YAO Z Q, MA J F, et al. A secure document self-destruction scheme with identity based encryption [C]//Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems. Piscataway, NJ: IEEE, 2013: 239-243. [8] XIONG J B, YAO Z Q, MA J F, et al. A secure document self-destruction scheme: an ABE approach [C]//Proceedings of the 2013 IEEE 10th International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing. Piscataway, NJ: IEEE, 2013: 59-64. [9] ZENG L, SHI Z, XU S, et al. SafeVanish: an improved data self-destruction for protecting data privacy [C]//Proceedings of the IEEE Second International Conference on Cloud Computing Technology and Science. Piscataway, NJ: IEEE, 2010: 521-528. [10] WOLCHOCK S, HOLFMANN O S, HENINGER N, et al. Defeating vanish with low-cost sybil attacks against large DHTs[C]//Proceedings of the 17th Annual Network & Distributed System Security Conference. San Diego: [s. n.], 2010:1-15. [11] 熊金波, 姚志强, 马建峰, 等.面向网络内容隐私的基于身份加密的安全自毁方案[J]. 计算机学报, 2014, 37(1):140-150.(XIONG J B, YAO Z Q, MA J F, et al. A secure self-destruction scheme with IBE for the Internet content privacy [J]. Chinese Journal of Computers, 2014, 37(1):140-150.) [12] 吴守才.云环境中基于信任评估的数据自销毁机制研究[D]. 沈阳:辽宁大学, 2015:1-60.(WU S C. Research on trust-based self-destructing scheme in cloud computing[D]. Shenyang: Liaoning University, 2015:1-60.) [13] 杨莎.基于云理论的信任评估模型及应用研究[D]. 北京: 华北电力大学, 2011:1-53.(YANG S. Research on trust evaluation model and application based on cloud theory[D]. Beijing: North China Electric Power University, 2011:1-53.) [14] LI T L, ZHOU X B. ZHT: a light-weight reliable persistent dynamic scalable zero-hop distributed Hash table[C]//Proceedings of IEEE 27th International Parallel Distributed Processing Symposium. Piscataway, NJ: IEEE, 2013:775-787. [15] FALKER J, POATEK M, JOHN P, et al. Profiling a million user DHT[C]//Proceedings of the 7th ACM SIGCOMM Conference on Internet Measurement. New York: ACM, 2007:129-134. [16] 翟学伟.信任的本质及其文化[J]. 社会, 2014, 34 (1):1-26.(ZHAI X W. The Essence of trust and its culture[J]. Chinese Journal of Sociology, 2014, 34(1):1-26.) [17] 魏达, 贾翔鹏, 王健, 等.基于可信证书的可信网络接入模型及实现[J]. 吉林大学学报(工学版), 2010, 40(2):496-500.(WEI D, JIA X P, WANG J, et al. New access model and implementation of trusted network based on trusted certificate[J]. Journal of Jilin University (Engineering and Technology Edition), 2010, 40(2):496-500.) [18] 张仕斌, 许春香.基于云模型的信任评估方法研究[J]. 计算机学报, 2013, 36(2):422-430.(ZHANG S B, XU C X. Study on the trust evaluation approach base on cloud model[J]. Chinese Journal of Computers, 2013, 36(2):422-430.) [19] 路峰, 吴慧中.网格环境下基于云模型的信任评估和决策方法研究[J]. 系统仿真学报, 2009, 21(2):421-426.(LU F, WU H Z. Research of trust valuation and decision-making based on cloud model in grid environment[J]. Journal of System Simulation, 2009, 21(2):421-426.) [20] 李德毅, 孟海军, 史雪梅.隶属云和隶属云发生器[J]. 计算机研究与发展, 1995, 32(6):15-20.(LI D Y, MENG H J, SHI X M. Membership clouds and membership cloud generators[J]. Journal of Computer Research and Development, 1995, 32(6):15-20.) [21] 王亮, 郭亚军.P2P系统中基于声誉的信任评估机制[J]. 计算机工程与应用, 2009, 45(15):136-138.(WANG L, GUO Y J. Reputation-based on trust evaluation mechanism for P2P system[J]. Computer Engineering and Applications, 2009, 45(15):136-138.) [22] 章夏彦, 张少敏.信任计算在大用户直购电交易中的研究与应用[D]. 北京:华北电力大学, 2010:1-55.(ZHANG X Y, ZHANG S M. Research and application of trust computing in direct power power purchase for large consumers[D]. Beijing: North China Electric Power University, 2010:1-55.) [23] 沈薇薇, 姚志强, 熊金波, 等. 面向移动终端的隐私数据安全存储及自毁方案[J]. 计算机应用, 2015, 35(1):77-82.(SHEN W W, YAO Z Q, XIONG J B, et al. Secure storage and self-destruction scheme for privacy data in mobile devices [J]. Journal of Computer Applications, 2015, 35(1):77-82.) |