7Levenshtein V I. Binary codes capable of correcting spurious insertions and deletions of ones (orginal in Russian) [ C ]. Russian Problemy Peredachi informatsii, 1965,12-25.
8Yianilos P. The Like It intelligent string comparison facility [ R]. NEC Institute Tech Report 97-093, 1997.
9Nirenburg S, Domashnev C, Grannes DJ. Two approaches to matching in example-based machine translation [ C ]// Proceedings of TMI-93, Japan:Kyoto, 1993(7) :47-57.
10ParaSite E Sperms. Mining structural information on the web [ C]//Proceeding of The Sixth International World Wide web Conference, 1997:1205-1215.
3Gens F.IT Cloud service user survey,pt.2:Top Bene? ts&Challenges IDC exchange. . 2010
4Chen Y P,Paxson V,Katz R H.What’’s new about cloud computing security?. Technical Report No. UCB/EECS-2010-5 . 2010
5Mather T,Kumaraswamy S,Latif S.Cloud Security and Privacy,an Enterprise Perspective on Risks and Compliance. . 2009
6Blaze M,Feigenbaum J,Lacy J.Decentralized Trust Management. Proceedings of the 17th Symposium on Security and Privacy . 1996
7Winsborough W H,Seamons K E,Jones V E.Automated trust negotiation. Proceedings of the DARPA Information Survivability Conference and Exposition . 2000
8Li N,Winsborough W H,Mitchell J C.Distributed credential chain discovery in trust management. Journal of Computer Security . 2003