2Boneh D ,Franklin M. Identity-based encryption from the Weil pairing [ J ]. SIAM journal on computing, 2003,32 ( 3 ) : 586 - 615.
3Mather T, Kumaraswamy S, Latif S. Cloud security and privacy [M]. [s. I. ] :O' Reilly Media,2009.
4Wu Hanqian, Ding Yi, Chuck W, etal. Network security for virtual machine in cloud computing [ C ]//Proceedings of 5th international conference on computer, sciences and conver- gence information technology. Seoul, Korea: [ s. n. ] ,2010:18 -21.