[1] Miller M. 云计算[M]. 北京:机械工业出版社, 2009.[2] Gartner J B. Seven cloud-computing security risks . (2009-08-07) . http://www.infoworld.com/d/security-central/gartner-seven-cloud-computingsecurity-risks-853.[3] 张唯唯. 基于云计算的安全系统研究 . 中国科技论文在线. .http://www.paper.edu.cn/index.php/default/releasepaper/content/201012-1239.[4] 关振胜. 公钥基础设施PKI及其应用[M]. 北京:电子工业出版社, 2008.[5] Shamir A. Identity-based cryptosystems and signature schemes[C]//CRYPTO'85: Advances in Cryptology. Berlin: Springer-Verlag, 1985: 47-53.[6] Boneh D, Franklin M. Identity-based encryption from the Weil pairing[C]//CRYPTO'01: Advances in Cryptology. Berlin: Springer-Verlag, 2001: 213-229.[7] Baek J, Newmarch J, Safavi-Naini R, et al. A survey of identity-based cryptography[C]//AUUG'04: The Australian Unix Users Group Annual Conference. 2004: 95-104.[8] Chatterjee S, Sarkar P. Identity-based encryption[M]. UK: Springer New York Dordrecht Heidelberg London, 2011.[9] Sahai A. Waters B. Fuzzy identity-based encryption[C]//CRYPTO'05: Advances in Cryptology. Berlin: Springer-Verlag, 2005: 457-473.[10] Kirsch J. Towards key-privacy in a fuzzy identity-based encryption scheme . Advanced Cryptographic Protocols (600.642), Johns Hopkins University, Spring 2005.[11] Han J W, Kamber M. 数据挖掘:概念与技术[M]. 2版.北京:机械工业出版社, 2007.[12] Zhang W Y, Zhang M H. Research on data mining method based on attribute-oriented generalization and information gain[J]. Computer Application, 2006, 26(4): 861-866.[13] Zeng F P, Li L, Li J, et al. Research on test suite reduction using attribute relevance analysis[C]//ICIS'09: The 2009 8th IEEE/ACIS International Conference on Computer and Information Science. Shanghai, China, 2009: 961-966.[14] Agrawal R, Evfimievski A, Srikant R. Information sharing across private databases[C]//SIGMOD'03: The 2003 ACM SIGMOD International Conference on Management of Data. New York, NY, USA, 2003: 86-97.[15] Khayat S H. Using commutative encryption to share a secret[R]. Cryptology ePrint Archive: Report, 2008:356.[16] Shannon C E. Communication theory of secrecy systems[J]. Bell System Technical Journal, 1949, 28-4: 656-715. |