A Time-Controlled Data Destruction Model Adapted for Cloud Storage
暂无分享,去创建一个
[1] Yang Tang,et al. Secure Overlay Cloud Storage with Access Control and Assured Deletion , 2012, IEEE Transactions on Dependable and Secure Computing.
[2] Radia J. Perlman,et al. File system design with assured delete , 2005, Third IEEE International Security in Storage Workshop (SISW'05).
[3] Xu Xiaolong,et al. Cloud Data Security and Integrity Protection Model Based on Distributed Virtual Machine Agents , 2016 .
[4] Jie Zhu,et al. Cloud Data Security and Integrity Protection Model Based on Distributed Virtual Machine Agents , 2016, 2016 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC).
[5] Ronald L. Rivest,et al. All-or-Nothing Encryption and the Package Transform , 1997, FSE.
[6] Randal C. Burns,et al. Secure deletion for a versioning file system , 2005, FAST'05.
[7] Radia Perlman,et al. The ephemerizer: making data disappear , 2005 .
[8] Shen Weiwei,et al. Assured Deletion Scheme for Electronic Files Based on Life Cycle Control , 2016 .
[9] Amit A. Levy,et al. Vanish: Increasing Data Privacy with Self-Destructing Data , 2009, USENIX Security Symposium.
[10] Xiong Jin. A Secure Self-Destruction Scheme with IBE for the Internet Content Privacy , 2014 .
[11] Dan Feng,et al. SafeVanish: An Improved Data Self-Destruction for Protecting Data Privacy , 2010, 2010 IEEE Second International Conference on Cloud Computing Technology and Science.
[12] Алексей Вячеславович Бердник. Проблемы безопасности облачных вычислений. Анализ методов защиты облаков от cloud Security Alliance , 2013 .
[13] Xu Xiaoping,et al. Research on Cloud Computing Security Platform , 2012, 2012 Fourth International Conference on Computational and Information Sciences.
[14] Zahir Tari,et al. Security and Privacy in Cloud Computing: Vision, Trends, and Challenges , 2015, IEEE Cloud Computing.
[15] Dong Yong-feng. A Data Assured Deletion Approach Adapted for Cloud Storage , 2012 .