1. Feng D G, Zhang M, Zhang Y, et al. Study on cloud computing security. Journal of Software, 2011, 22(1): 71-83 (in Chinese)
2. Taban G, Cardenas A A, Gligor V D. Towards a secure and interoperable DRM architecture. Proceedings of the 6th ACM Workshop on Digital Rights Management (DRM’06), Oct 30-Nov 3, 2006, Alexandria, VA, USA. New York, NY, USA: ACM, 2006: 69-78
3. Qiu Q, Tang Z, Yu Y Y. A decentralized authorization scheme for DRM in P2P file-sharing systems. Proceedings of the 2011 IEEE Consumer Communications and Networking Conference (CCNC’11), Jan 8-11, 2011, Las Vegas, NV, USA. Piscataway, NJ, USA: IEEE, 2011: 136-140
4. Mishra D, Mukhopadhyay S. Privacy preserving hierarchical content distribution in multiparty multilevel DRM. Proceedings of the 2012 World Congress on Information and Communication Technologies (WICT’12), Oct 30-Nov 2, 2012, Trivandrum, IA, USA. Piscataway, NJ, USA: IEEE, 2012: 525-530
5. Wang C K, Zou P, Liu Z, et al. CS-DRM: a cloud-based SIM DRM scheme for mobile internet. EURASIP Journal on Wireless Communications and Networking, 2011(1): 1-30
6. Lee S, Park H, Kim J. A secure and mutual-profitable DRM interoperability scheme. Proceedings of the IEEE Symposium on Computers and Communications (ISCC’10), Jun 22-25, 2010, Riccione, Italy. Piscataway, NJ, USA: IEEE, 2010: 75-80
7. He Y J, Hui L C K, Yiu S M. Avoid illegal encrypted DRM content sharing with non-transferable re-encryption. Proceedings of the IEEE 13th International Conference on Communication Technology (ICCT’11), Sep 25-28, 2011, Jinan, China. Piscataway, NJ, USA: IEEE, 2011: 703-708
8. Corena J C, Ohtsuki T. Secure and fast aggregation of financial data in cloud-based expense tracking applications. Journal of Network and Systems Management, 2012, 20(4): 534-560
9. Samanthula B K, Howser G, Elmehdwi Y, et al. An efficient and secure data sharing framework using homomorphic encryption in the cloud. Proceedings of the 1st International Workshop on Cloud Intelligence (Cloud-I’12), Aug 31, 2012, Istanbul, Turkey. New York, NY, USA: ACM, 2012: 8p
10. Petrlic R, Sorge C. Privacy-preserving DRM for cloud computing. Proceedings of the 26th IEEE International Conference on Advanced Information Networking and Applications Workshops (WAINA’12), Mar 26-29, 2012, Fukuoka, Japan. Piscataway, NJ, USA: IEEE, 2012: 1286-1291
11. Petrlic R. Proxy re-encryption in a privacy-preserving cloud computing DRM scheme. Proceedings of the 4th International Symposium on Cyberspace Safety and Security (CSS’12), Dec 12-13, 2012, Melbourne, Australia. LNCS 7672. Berlin, Germany: Springer-Verlag, 2012: 194-211
12. Ateniese G, Fu K, Green M, et al. Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Transactions on Information and System Security, 2006, 9(1): 1-30
13. Rivest R L, Adleman L, Dertouzos M L. On data banks and privacy homomorphisms. In: Foundations of Secure Computation. New York, NY, USA: Academic Press, 1978: 169-177
14. Gentry C. Fully homomorphic encryption using ideal lattices. Proceedings of the 41st Annual ACM Symposium on Theory of Computing (STOC’09), May 31-Jun 2, 2009, Bethesda, MD, USA. New York, NY, USA: ACM, 2009:169-178
15. Matt B, Gerrit B, Martin S. Divertible protocols and atomic proxy cryptography. Advances in Cryptology: Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques (EUROCRYPT’98), May 31-Jun 4, 1998, Espoo, Finland. LNCS 1403. Berlin, Germany: Springer-Verlag, 1998: 127-144
16. Ma Z F, Fan K F, Chen M, et al. Trusted digital rights management protocol supporting for time and space constraint. Journal on Communications, 2008, 29(10): 153-164 (in Chinese)
17. Zhang Z Y, Pei Q Q, Ma J F, et al. Establishing multi-party trust architecture for DRM by using game-theoretic analysis of security policies. Chinese Journal of Electronics, 2009, 18(3): 519-524
18. Jiang W, Murugesan M, Clifton C, et al. Similar document detection with limited information disclosure. Proceedings of the IEEE 24th International Conference on Data Engineering (ICDE’08), Apr 7-12, 2008, Cancun, Mexico. Piscataway, NJ, USA: IEEE, 2008: 735-743