[1] Brunette G, Mogull R. Security Guidance for critical areas of focus in Cloud Computing V2.1[R/OL]. CSA (Cloud Security Alliance), USA. (2009-12)[2014-07-02]. https://cloudsecurityalliance.org/guidance/csaguide.v2.1.pdf.[2] Amazon. Amazon simple storage service (Amazon S3)[EB/OL].[2014-07-02].http://aws.amazon.com/s3/.[3] Chappell D. Introducing the Windows Azure Platform[R/OL].(2009-12)[2014-07-02] http://www.davidchappell.com/writing/white_papers/Windows_Azure_Platform_v1.3-Chappell.pdf.[4] Google. Google storage for developers:developer's guide[G/OL].[2014-07-02]. https://cloud.google.com/storage/docs/concepts-techniques.[5] Richardson L, Ruby S. RESTful Web Services中文版[M].徐涵,李红军,胡伟,等译.北京:电子工业出版社, 2008.[6] W3C. W3C soap specifications[EB/OL].[2014-07-02]. http://www.w3.org/TR/soap/.[7] 王平建,荆继武,王琼霄,等. 云存储中的访问控制技术研究[J]. 信息网络安全,2011(9):41-43.[8] Bellare M, Canetti R, Krawczyk H. Keying Hash functions for message authentication[C/OL]//Proceedings of the 16th Annual International Cryptology Conference (CRYPTO). 1996:1-15.[9] OASIS. Security assertion markup language (SAML) V2.0 Technical Overview[S/OL]. OASIS Standard.(2008-03)[2014-07-02]. https://www.oasis-open.org/committees/download.php/27819/sstc-saml-tech-overview-2.0-cd-02.pdf.[10] OpenID Authentication 2.0[EB/OL]. OpenID.Net.[2014-07-02].https://openid.net/specs/openid-authentication-2_0.html.[11] Shibboleth[EB/OL].[2014-07-02].http://www.shibboleth.net/. |