[1] 季一木,匡子卓,康家邦,等.云环境下用户隐私属性及其分类研究[J].孙计算机应用研究.2014,05.
[2] 代晓丽.物联网安全技术研究[D].北京邮电大学.2012.5
[3] ARMBRUST M,FOX A,GRIFFITH R,et al. Above the clouds: a Berkeley view of cloud computing,UCB / EECS-2009-28 [R]. Berkeley:University of California at Berkeley,2009.
[4] 冯登国,张敏,李昊.大数据安全与隐私保护[J]. 计算机学报. 2010(03).
[5] Sahai A,Waters B, Fuzzy Identity-based Encryption[C] //Proceedings of EUROCRYPT'05. Berlin, Germany: Springer-Verlag,2005: 457-473.
[6] Goyal V, Pandey 0, Sahai A,et al. Attribute based encryption for fine-grained access control of encrypted data[C]//Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS '06). New York, NY, USA: ACM, 2006: 89-98.
[7] Bethencourt J, Sahai A, Waters B. Ciphertext-Policy Attribute-Based Encryption[C]// IEEE Symposium on Security and Privacy. New York: IEEE Computer Society, 2007: 321-334.
[8] SONG D X, WAGNER D, PERRIG A. Practical techniques for searches on encrypted data[C]// IEEE Computer Society. 2000: 44.
[9] 朱向洋.面向云环境的隐私保护多关键词检索技术研究[D].南京邮电大学.2018,11.