1SONG D,WAGNER D,PERRIG A. Practical Techniques for Searches on Encrypted Data,Proceedings of the IEEE Symposium on Security and Privacy(S&P" 00), May 14 - 17,2000, Berkeley, CA, USA. Piscataway, N J, USA : IEEE, 2000 : 44 - 55.
2BONEH D,CRESCENZO G,OSTROVSKY R,et al. Public Key Encryption With Keyword Search , Advances in Cryptology. - ceedings of the 23rd Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT 04), May 2- 6,2004, Interlaken,Switzerland. LNCS 3027. Berlin,Germany: Springer-Verlag,2004 : 506- 522.
3PARK D,KIM K,LEE P. Public Key Eneryption With Conjunctive Field Keyword Search,Proceedings of the 2004 Workshop on Information Security Applications (WISA'04) ,Oct 29- 31,2004, Wuhan,China. LNCS 3325. Berlin,Germany: Springer-Verlag, 2004 : 73- 86.
4SWAMINATHAN AoMAO Y, SU G M, et al. Confidentiality-Preserving Rank-Ordered Search , Proceedings of the 2007 ACM Workshop on Storage Security and Survivability (StorageSS 07), Oct 29,2007, Alexandria, VA, USA. New York, NY, USA: ACM, 2007:7-12.
5Damiani E,et al. Key management for multi-user encrypted databases ,Proc of the 2005 ACM Workshop on Storage Security and Survivability. New York: ACM, 2005 : 74- 83.
6Kallahalla M,Riedel E, Swaminathan R, et al. Plutus-scalable secure file sharing on untrusted storage , Proc of the 2nd USENIX Conf on File and Storage Technologies (FAST). Berkeley: USENIX, 2003 : 29- 42.
8Tian X,Wang X,Zhou A. DSP RE-encryption:A flexible mechanism for access control enforcement management in DaaS, Proc of IEEE Int Conf on Cloud Computing. Washington:IEEE,2009:25-32.
9Vimereati S D C,Foresti S,Jajodia S, et al. Over-encryption: Management of access control evolution on outsoureed data, Proc of VLDB 2007. 2007 : 123- 134.