[1] Peter Mell,Timothy Grance. The NIST Definition of Cloud Computing (Draft). NIST special publication, 2011 - pre-developer.att.com.[2] Joost Reede.On A-Select and Federated Identity Management Systems [D]. twente university,Netherlands,http://essay.utwente.nl/712/1/scriptie_Reede.pdf,2007.[3] A.B.Spantzel, A.C.Squieeiarini, E.Bertino. Integrating federated digital Identity Management and trust negotiation[C]. IEEE Security and Privacy Magazine. 2005.[4] Hongwei Li,Yuanshun Dai,Ling Tian,Haomiao Yang. Identity-Based Authentication for Cloud Computing[R]. Cloud Computing of Lecture Notes in Computer Science, 2009(5931): 167-177.[5] Liang Yan,Chunming Rong,Gansen Zhao. Strengthen Cloud Computing Security with Federal Identity Management Using Hierarchical Identity-Based Cryptography[J]. Cloud Computing of Lecture Notes in Computer Science,2009(5931): 157-166.[6] Elisa Bertino,Federica Paci,Rodolfo Ferrini. Privacy-preserving Digital Identity Management for Cloud Computing[J].Bulletin of the IEEE Computer Society Technical Committee on Data Engineering, 2009,32(1):21-27.[7] Z. Hao,S. Zhong,N. Yu. A Time-Bound Ticket-Based Mutual Authentication Scheme for Cloud Computing[J]. International Journal of Computers, Communications & Control, 2011,6(2):227-235.[8] Zhang Qikun, Li Yuanzhang, Song Danjie,Tan Yuan. Alliance-Authentication Protocol in Clouds Computing Environment [J]. China Communications, 2012, 9(7) : 43-54.[9] Zheng Jun, Guo Xianchen, Zhang Quanxin, Zhang Qikun. A cross domain authentication protocol based on ID[J]. International Journal of Computer Science Issues, 2013, 10(1): 264-270.[10] Zh. Lei, Q. Wu, Q. Bo, J. Domingo Ferrer. Asymmetric group key agreement protocol for open networks and its application to broadcast encryption[J]. Computer Networks 2011(55): 3246–3255.[11] 王崇霞, 高美真, 刘倩, 周贤伟. 混合云联合身份认证与密钥协商协议设计[J].电信科学, 2014,30(4) : 95-100. Wang Chongxia, Gao Meizhen, Liu Qian, Zhou Xianwei. Design of Identity Based on Authentication and Key Agreement Protocol for Hybrid Cloud[J]. Telecommunication Science, 2014,30(4) : 95-100.(in Chinese)[12] 彭华熹. 一种基于身份的多信任域认证模型[J]. 计算机学报, 2006, 29(8):1271-1282.Peng Huaxi. An Identity-Based Authentication Model for Multi-Domain[J].Chinese Journal of Computers, 2006, 29(8):1271-1282.(in Chinese)[13] Kata, J., & Lindell, Y. Introduction to modern cryptography[M]. New York: CRC Press, 2007.[14] 汪定,马春光,张启明. 一种强口令认证方案的攻击和改进[J]. 计算机科学, 2012,39(6) : 72-76.Wang Ding, Ma Chunguang, Zhang Qiming. Attacks and Improvements on a Strong-password Authentication Scheme[J]. Computer Science, 2012,39(6) : 72-76.(in Chinese) |