Reference: [1] Feng D G, Zhang M, Zhang W. Research on Cloud Computing Security[J]. Journal of Software, 2011, 22(1): 71-83. [2] Wang X J, Zhang W, Chen Q. An attribute-based encryption scheme with efficient attribute revocation[J]. Journal of Computer Applications, 2012, 32(S1):39-43. [3] Liu F, Yang M. A ciphertext policy attribute-based encryption scheme for cloud storage[J]. Journal of Computer Applications, 2012, 29(4): 1452-1456. [4] Yu S, Wang C, Ren K, et al. Attribute based data sharing with attribute revocation[C]. Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security. ACM, 2010: 261-270. [5] He Y C, Wang X Z, Liu K Q, et al. Convergence Analysis and Algorithm Improvement of Differential Evolution[J]. Journal of Software, 2010, 21(5): 875-885.
|