1. Y. Yu, M. H. Au, Y. Mu, S. Tang, J. Ren, W. Susilo, et al., “Enhanced Privacy of a Remote Data Integrity-Checking Protocol for Secure Cloud Storage,” International Journal of Information Security, Vol. 14, pp. 307-318, 2015 2. R. Jin, H. -J. Cho, and T.-s. Chung, “An Encryption Approach to Secure Modification and Deletion for Flash-based Storage,”IEEE Transactions on Consumer Electronics, Vol. 60, pp. 662-667, 2014 3. J. Kaczmarek and M. R. Wrobel, “Operating System Security by Integrity Checking and Recovery using Write-Protected Storage,”IET Information Security, Vol. 8, pp. 122-131, 2014 4. A. S. Rawat, O. O. Koyluoglu, N. Silberstein,S. Vishwanath, “Optimal Locally Repairable and Secure Codes for Distributed Storage Systems,”IEEE Transactions on Information Theory, Vol. 60, pp. 212-236, 2014 5. S. Distefano and A. Puliafito, “Information Dependability in Distributed Systems: The Dependable Distributed Storage System,”Integrated Computer-Aided Engineering, Vol. 21, pp. 3-18, 2014 6. M. Liu, S. Liu, W. Fu,J. Zhou, “Distributional Escape Time Algorithm based on Generalized Fractal Sets in Cloud Environment,”Chinese Journal of Electronics, Vol. 24, pp. 124-127, 2015 7. A. N. Singh, “Information Security Management Maturity: a Study of Select Organizations,” 2014 8. W. Au and B. White, “Integrating Information Technology in a Discovery Achool-A Case Study,” inProceedings of International Conference on Computers in Education, pp. 701-702, 2002 9. B. Yang, X. Tang,J. Li, “A Systematic Piggybacking Design for Minimum Storage Regenerating Codes,”IEEE Transactions on Information Theory, Vol. 61, pp. 5779-5786, 2015 10. Y. Ren, J. Shen, Y. Zheng, J. Wang,H.-C. Chao, “Efficient Data Integrity Auditing for Storage Security in Mobile Health Cloud,”Peer-to-Peer Networking and Applications, Vol. 9, pp. 854-863, 2016 11. A. H. Celdrán, G. D. Tormo, F. G. Mármol, M. G. Pérez,G. M. Pérez, “Resolving Privacy-Preserving Relationships over Outsourced Encrypted Data Storages,”International Journal of Information Security, Vol. 15, pp. 195-209, 2016 12. B. Jia, S. Liu,Y. Yang, “Fractal Cross-Layer Service with Integration and Interaction in Internet of Things,” International Journal of Distributed Sensor Networks, Vol. 10, pp. 760248, 2014 13. S.-W. Park, J. Kim, and D. G. Lee, “SecureDom: Secure Mobile-Sensitive Information Protection with Domain Separation,”The Journal of Supercomputing, Vol. 72, pp. 2682-2702, 2016 14. H. Wu, X. Dang, L. Wang,L. He, “Information Fusion-based Method for Distributed Domain Name System Cache Poisoning Attack Detection and Identification,”IET Information Security, Vol. 10, pp. 37-44, 2016 15. G. Yang and S. Liu, “Distributed Cooperative Algorithm for k-M Set with Negative Integer k by Fractal Symmetrical Property,” International Journal of Distributed Sensor Networks, Vol. 10, pp. 398583, 2014 16. H. Jiang, F. Shen, S. Chen, K. -C. Li, and Y. -S. Jeong, “A Secure and Scalable Storage System for Aggregate Data in IoT,”Future Generation Computer Systems, Vol. 49, pp. 133-141, 2015 17. Y. Djemaiel and N. Boudriga, “Modeling and Assessing the Impact of Security Attacks on Enterprise Information Systems,” inProceedings of International Conference on Business Information Systems, pp. 281-292, 2014 |