1M.Armbrust,A.Fox,R.Griflith,et al.A view of cloud computing.Communications of the ACM,2010,53(4):50-58.
2S.Wang,Z Liu,Q Sun,et al.Towards an accurate evaluation of quality of cloud service in service-oriented cloud computing.Journal of Intelligent Manufacturing,2012:1-9.
6B.Littlewood,A.Abdel-Ghaly,P.Chan.Tools for the Analysis of the Accuracy of Software Reliability Predicitons.Spring-Verlag,Heidelberg,1986.
7M.R.Lyu.Software Reliability Engineering:A Roadmap[C] .In:Proceding of Future of Software Engineering,Minneapolis,Minnesota,May 23-25,2007,153-170.
8K.Goseva-Popstojanova,K.Trivedi.Architecture-Based approach to reliability assessment of software systems[J] .Performance Evaluation,2001,45(2-3):179-204.
9S.S.Gokhale.Architecture-Based Software Reliability Analysis:Overview and Limitations.IEEE Transactions on Dependable and Secure Computing[J] ,2007,4(1):32-40.
10R.C.Cheung.A user-oriented software reliability model[J] .IEEE Transactions on Software and Engineer.1980,6(2):118-125.
5Crampton J, Martin K, Wild P. On key assignment for hierarchical access control. In: Guttan J, ed, Proc. of the 19th IEEE Computer Security Foundations Workshop--CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5-7.
6Damiani E, De S, Vimercati C, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategies for data outsourcing. In: Venter HS, Eloff MM, Labuschagne L, Eloff JHP, Solms RV, eds. New Approaches for Security, Privacy and Trust in Complex Environments, Proc. of the IFIP TC-11 22nd Int'l Information Security Conf. Sandton: Springer-Verlag, 2007. 395-396.
7Bethencourt J, Sahai A, Waters B. Ciphertext-Policy attribute-based encryption. In: Shands D, ed. Proc. of the 2007 IEEE Symp. on Security and Privacy. Oakland: IEEE Computer Society, 2007. 321-334. [doi: 10.1109/SP.2007.11].
8Yu S, Ren K, Lou W, Li J. Defending against key abuse attacks in KP-ABE enabled broadcast systems. In: Bao F, ed. Proc. of the 5th Int'l Conf. on Security and Privacy in Communication Networks. Singapore: Springer-Verlag, http://www.linkpdf.com/ ebook-viewer.php?url=http://www.ualr.edu/sxyul/file/SecureCommO9_AFKP_ABE.pdf.
9Ibraimi L, Petkovic M, Nikova S, Hartel P, Jonker W. Ciphertext-Policy attribute-based threshold decryption with flexible delegation and revocation of user attributes. Technical Report, Centre for Telematics and Information Technology, University of Twente, 2009.
10Roy S, Chuah M. Secure data retrieval based on ciphertext policy attribute-based encryption (CP-ABE) system for the DTNs. Technical Report, 2009.