5STEVE M.Danger in the clouds[J].Network Security,2008,2008(12):9-11.
6RABIN M O.Efficient dispersal of information for security,load balancing,and fault tolerance[J].Journal of the ACM,1989,1(38):335-348.
7HAMAN M,HIEROUS R M.An overview of program slicing[J].Software Focus,2001,2(3):85-92.
8PIANK J S,XU Lihao.Optimizing Cauchy ReedSolomon codes for fault-tolerant storage applications[C] //Proceedings of the 5th IEEE International Symposium on Network Computing and Applications.Piscataway,NJ,USA:IEEE,2006:173-180.
10BOWERS K D,JUELS A,OPREA A.HAIL:a highavailability and integrity layer for cloud storage[C] //Proceedings of the 16th ACM Conference on Computer and Communications Security.New York,USA:ACM,2009:489-501.