1. Cachin C, Keidar I, Shraer A. Trusting the cloud[J]. ACM SIGACT News, 2009, 40 (2): 81-86.
2. Goyal V, Pandey O, Sahai A, et al. Attribute basedencryptionfor fine-grained access control of encrypted data [DB /OL]. [2012-01-09]. http: / /dl. acm. org/ci-tation. cfm?id = 1180418.
3. Bethencourt J, Sahai A, Waters B. Ciphertext-policyattribute-based encryption[DB /OL]. [2012-02-11]. http: / /ieeexplore. ieee. org/xpls/abs_all. jsp?ar-number = 4223236.
4. Flood Cheng, Zhang Min, FENG Deng. AB-ACCS: A cloud storage ciphertext accessControl method [J]. Computer Research and Development, 2010, 47: 259-265. Hong Cheng, Zhang Min Feng Dengguo. AB-ACCS: Acryptographic access control scheme for cloud storage[J]. Journal of Computer Research and Development, 2010, 47: 259-265(Ch).
5. SunState Azusa, Dong Yu, Li Yun. Based onCP-ABEAlgorithms cloud storage dataAccess Control [J]. Journal of Communication, 2011, 32 (7): 147-152. Sun Guozi, Dong Yu, Li Yun. CP-ABE based data ac-cess control for cloud storage[J]. Journal on Commu-nications, 2011, 32 (7): 147-152(Ch).