Author:
Li Taoshen,Zhou Xiong,Wang Ruwei
Reference15 articles.
1. Modi, C., Patel, D., Borisaniya, B., Patel, A., Rajarajan, M.: A survey of intrusion detection techniques in Cloud. J. Netw. Comput. Appl. 36(1), 42–57 (2013)
2. Belen, C.Z., Jose, L.F.A., Ambrosio, T.: Security in cloud computing: a mapping study. Comput. Sci. Inf. Syst. 12(1), 161–184 (2014)
3. Wang, J.F., et al.: Efficient verifiable fuzzy keyword search over encrypted data in cloud computing. Comput. Sci. Inf. Syst. 10(2), 667–684 (2013)
4. Huang, R.W., Gu, X.L., Yang, S., Zhou, W.: Study of privacy preserving framework for cloud storage. Comput. Sci. Inf. Syst. 8(3), 801–819 (2011)
5. Liu, D.X., Wang, S.L.: Programmable order-preserving secure index for encrypted database query. In: 2012 IEEE Fifth International Conference on Cloud Computing, pp. 502–509. IEEE Computer Society, Honolulu (2012)