Computer Science ›› 2016, Vol. 43 ›› Issue (4): 118-121.doi: 10.11896/j.issn.1002-137X.2016.04.024
Previous Articles Next Articles
CHEN Feng, BAO Ai-hua and ZHANG Wei-ming
[1] https://www.dropbox.com [2] https://skydrive.live.com [3] http://www.ksyun.com [4] http://yunpan.360.cn [5] Cao Xi,Xu Li,Chen Lan-xiang.Data integrity verification protocol in cloud storage system[J].Journal of Computer Applications,2012,32(1):8-12(in Chinese) 曹夕,许力,陈兰香.云存储系统中数据完整性验证协议[J].计算机应用,2012,32(1):8-12 [6] Yan Xiang-tao,Li Yi-fa.Integrity Checking Algorithm Based on Hash Tree for Cloud Storage[J].Computer Science,2012,39(12):94-97(in Chinese) 颜湘涛,李益发.基于哈希树的云存储完整性检测算法[J].计算机科学,2012,39(12):94-97 [7] Liu Fan,Yang Ming.Ciphertext policy attribute based on en-cryption scheme for cloud storage[J].Application Research of Computers,2012,29(4):1452-1456(in Chinese) 刘帆,杨明.一种用于云存储的密文策略属性基加密方案[J].计算机应用研究,2012,29(4):1452-1456 [8] Lim H,Kapoor V,Wighe C.Active disk file system:Adistribu-ted,scalable filesystem[C]∥Proceedings of the Eighteenth IEEE Symposium.Washington,DC:IEEE Computer Society,2001:101-114 [9] Swank J D,Goodson G R,Scheinholtz M L,et al.Self-securing storage:Protecting data incompromised systems[C]∥Proc of the 4th Symposium on Operating Systems Design and Implementation.Berkeley,CA:USENIX Association,2000:12-26 [10] Jin Chao,Zhen Wei-min,Zhang You-hui.Active Storage Architecture[J].Chinese Journal of Computers,2005,8(6):1013-1020(in Chinese) 靳超,郑纬民,张悠慧.主动存储系统结构[J].计算机学报,2005,8(6):1013-1020 [11] Zhao Yue-long,Jiang Qian.Research and Design of the Virtua-lization Storage Technology Based on Intelligent Network Disk[J].Journal of Computer Research and Development,2009,6(Supp1):44-49(in Chinese) 赵跃龙,蒋骞.基于智能网络磁盘的虚拟存储技术的研究与设计[J].计算机研究与发展,2009,6(Supp1):44-49 [12] Using virtual desktop to improve the ability of the management and control [EB/OL].[2010-3-15].http://www.vmware.com/cn/solutions/desktop [13] King S T,Dunlap G W,Chen P M.Operaring System Support for Virtual Machines[C]∥Proc of the 2003 Annual USENIX Technical Conference.2003:6 [14] Griffin J L,Jaeger T,Perez R,et al.Trusted virtual domains:Toward secure distributed services[C]∥Proceedings of the 1st IEEE Workshop on Hot Topics in System Dependability.Los Alamitos:IEEE Computer Society.2005:274-281 [15] Gasmi Y,Sadeghi A-R,Stewin P,et al.Flexible and Secure Enterprise Rights Management Based on Trusted Virtual Domains[C]∥Proc of the 3rd ACM Workshop on Scalable Trusted Computing.2008:71-88 [16] Yang Yu.OS level virtualization and its applications[D].NewYork:Stony Brook University,2007 [17] http://dokan-dev.net/en [18] Denning D E.A lattice model of secure information flow[J].Communications of the ACM,1976,9(5):236-243 |
No related articles found! |
|