3Meiko Jensen, Jorg Schwenk, Nils Gruschka, etal. On technical security issues in cloud computing [C]. Cloud, 2009 IEEE International Conference on Cloud Computing, 2009:109- 116.
4Xu Jin- song, Huang Ru- cheng, Huang Wan -ming, etal. Secure document service for cloud computing [ C]. In CloudComO9: Proceedings of the 1st International Conference on Cloud Computing, Beijing, China, 2009:541 -546.
5Chang Y. C, Mitzenmacher M. Privacy preserving keyword searches on remote encrypted data. Ioannidis J, Keromytis A. D, Yung M, eds. LNCS 3531. New York : Springer - Verlag, 2005 ; 442 - 455.
6Malek B, Miri A. Combining attribute - based and access systems. Muzio J. C, Brent R. P, eds. Proc. IEEE CSE 2009,12th IEEE Int' I Conf. on Computational Science and Engineering. IEEE Computer Society, 2009:305 -312.
7Mowbray M, Pearson S. A client- based privacy manager for cloudcomputing [C]. In Proceedings of the 4th International ICST Conference on Communication System Software and Middleware, Dublin, Ireland, 2009: 1-8.
8Siani Pearson, Shen Yun, Miranda Mowbray. A privacy manager for cloud computing [C]. In CloudCom09= Proceedings of the 1st International Conference on Cloud Computing, Beijing, China, 2009:90 - 106.