4LEE C, LI C, CHANG R. A simple and efficient authentication scheme for mobile satellite communication systems[J]. InternationalJournal of Satellite Communications and Networking, 2012, 30(1): 29-38.
5CHOW R,JAKOBSSON M, MASUOKA R, et al. Authentication in the clouds: a framework and its application to mobile users[A]. Pro?ceedings of the 2010 ACM Workshop on Cloud Computing Security Workshop (CCSW)[C]. Chicago, USA, 2010.1-6.
6YU S, WANG C, REN K, et al. Attribute based data sharing with attribute revocation[A]. Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security (ASIACCS)[C]. Beijing, China, 2010.261-270.
7LIJ, ZHAO G, CHEN X, et al. Fine-grained data access control sys?tems with user accountability in cloud computing[A]. Proceedings of the 2th International Conference on Cloud Computing (CloudCom)[C]. Indianapolis, USA, 2010.89-96.
8ECHEVERRIA V, LIEBROCK L M, SHIN D. Permission manage?ment system: permission as a service in cloud computing[A]. The 34th Annual IEEE Computing Software and Applications Conference Workshops (COMPSAC)[C]. Seoul, South Korea, 2010.371-375.
9UNAL D, CAGLAYAN M U. A formal role-based access control model for security policies in multi-domain mobile networks[J]. Computer Networks, 2013, 57(1): 330-350.
10SHINJ, KIM Y, PARK W, et al. DFCloud: a TPM-based secure data access control method of cloud storage in mobile devices[A]. The 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings (CloudCom)[C]. 2012.