Affiliation:
1. Information Security Center; Beijing University of Posts and Telecommunications; Beijing 100876 China
Funder
Beijing Higher Education Young Elite Teacher Project
Research Fund for the Doctoral Program of Higher Education
Fundamental Research Funds for the Central Universities
Digital Right Management Technology Research and Development Project
National Key Technology Research and Development Program
National 863 Program
Subject
Computational Theory and Mathematics,Computer Networks and Communications,Computer Science Applications,Theoretical Computer Science,Software
Reference26 articles.
1. A view of cloud computing, comm;Armbrust;ACM,2010
2. first ed., ch. 7;Velte,2010
3. Hubbard D Sutton M Top Threats to Cloud Computing V1.0, Cloud Security Alliance 2010 https://cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf
4. Ateniese G Pietro RD Mancini LV Tsudik G Scalable and efficient provable data possession Proceedings of the 4th International Conference on Security and Privacy in Communication Networks. 2008
5. Lillibridge M Elnikety S Birrell A Burrows M Isard M A cooperative internet backup scheme Proceedings of the Annual Conference on USENIX Annual Technical Conference. CA, USA 2003 3 3, 29-41
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Securing cyberspace;Concurrency and Computation: Practice and Experience;2015-12-29