3STEVE M.Danger in the clouds[J].Network Security,2008,2008(12):9-11.
4RABIN M O.Efficient dispersal of information for security,load balancing,and fault tolerance[J].Journal of the ACM,1989,1(38):335-348.
5HAMAN M,HIEROUS R M.An overview of program slicing[J].Software Focus,2001,2(3):85-92.
6PIANK J S,XU Lihao.Optimizing Cauchy ReedSolomon codes for fault-tolerant storage applications[C] //Proceedings of the 5th IEEE International Symposium on Network Computing and Applications.Piscataway,NJ,USA:IEEE,2006:173-180.
8BOWERS K D,JUELS A,OPREA A.HAIL:a highavailability and integrity layer for cloud storage[C] //Proceedings of the 16th ACM Conference on Computer and Communications Security.New York,USA:ACM,2009:489-501.
9CACHIN C,KEIDAR I,SHRAER A.Trusting the cloud[J].ACM SIGACT News,2009,40 (2):455-461.
10WEATHERSPOOS H,EATON P,UBIATOWlZ J.Antiquity:exploiting a secure log for wide-area distributed storage[C] // Proceedings of the Second ACM European Conference on Computer Systems.New York,USA:ACM,2007:75-89.