1Morteza Nikooghadam,Ali Zakerolhosseini,Mohsen Ebrahimi Moghaddam.??Efficient utilization of elliptic curve cryptosystem for hierarchical access control(J)The Journal of Systems & Software . 2010 (10)
2Yang Yanjiang.Towards multi-user private keyword search for cloud computing. 2011IEEE 4th international conference on cloud computing . 2011
3ZHOU J,ZHENG S,JING D, et al.An approach of creative application evolution on cloud computing platform. Proceedings of the2011ACM Symposium on Applied Computing . 2011
4Yu S,Wang C,Ren K,et al.Achieving secure,scalable,and fine-grained data access control in cloud computing. IEEE INFOCOM 2010 . 2010
5Wang W C,Owens Z Li R,Bhargava B.Secure and efficient access to outsourced data. Proceedings of the first ACM Cloud Computing Security Workshop . 2009