4STEVE M.Danger in the clouds[J].Network Security,2008,2008(12):9-11.
5RABIN M O.Efficient dispersal of information for security,load balancing,and fault tolerance[J].Journal of the ACM,1989,1(38):335-348.
6HAMAN M,HIEROUS R M.An overview of program slicing[J].Software Focus,2001,2(3):85-92.
7PIANK J S,XU Lihao.Optimizing Cauchy ReedSolomon codes for fault-tolerant storage applications[C] //Proceedings of the 5th IEEE International Symposium on Network Computing and Applications.Piscataway,NJ,USA:IEEE,2006:173-180.
9BOWERS K D,JUELS A,OPREA A.HAIL:a highavailability and integrity layer for cloud storage[C] //Proceedings of the 16th ACM Conference on Computer and Communications Security.New York,USA:ACM,2009:489-501.
10CACHIN C,KEIDAR I,SHRAER A.Trusting the cloud[J].ACM SIGACT News,2009,40 (2):455-461.