4Xiong J. Yao Z. Ma J. et al. A secure document selfdestruction scheme with identity based encryption/ /Proceedings of the 5th International Conference on Intelligent Networking and Collaborative Systems. Xi/ an , China. 2013: 239-243.
5Goyal V. Pandey O. Sahai A. et al. Attribute-based encryption for fine- grained access control of encrypted datal / Proceedings of the ACM Conference on Computer and Communications Security. Alexandria. USA. 2006: 89-98.
6Perlman R. File system design with assured delete/ /Proceedings of the 3rd IEEE International Security in Storage Workshop. San Francisco. USA. 2005: 83-88.
7Tang Y. Lee P P. Lui J C. et al. FADE: Secure overlay cloud storage with file assured deletion/ /Proceedings of the Security and Privacy in Communication Networks. River Valley. Singapore. 2010: 380-397.
8Nair S K. Dashti M T. Crispo B. et al. A hybrid PKI-IBC based ephemerizer system/ /Proceedings of the International Information Security Conference. Sandton , South Africa. 2007: 241-252.
9Perlman R. The ephernerizer , Making data disappear. Journal of Information Systems Security. 2005. 1(1): 21-32.
10Geambasu R. Kohno T. Levy A. et al. Vanish: Increasing data privacy with self-destructing datal /Proceedings of the 18th USENIX Security Symposium. Montreal. Canada. 2009: 299-315.