Open Access
MATEC Web of Conferences
Volume 22, 2015
International Conference on Engineering Technology and Application (ICETA 2015)
Article Number 01041
Number of page(s) 4
Section Information and Communication Technology
Published online 09 July 2015
  1. Liu C, et al. 2014. Robust H∞ Control for satellite attitude control system with uncertainties and additive perturbation. International Journal of Science, 1(2): 1–9.
  2. Distributed Management Task Force (DMTF) (in Chinese).
  3. Cloud Security Alliance (in Chinese).
  4. How to protect personal privacy in the big data era.
  5. Chang Y.C. & Mitzenmacher M. 2005. Privacy preserving keyword searches on remote encrypted data. In: Ioannidis J, Keromytis AD, Yung M, eds. LNCS 3531. New York: Springer-Verlag, pp: 442−455.
  6. Liu C, Wang F. & Shi K, et al. 2014. Simulations for orbital maintenance of low-angle satellite based on STK. Energy Education Science and Technology Part A: Energy Science and Research, 32(6): 6307–6316.
  7. Malek B. & Miri A.2009. Combining attribute-based and access systems. In: Muzio JC, Brent RP, eds. Proc. IEEE CSE 2009, 12th IEEE Int’l Conf. on Computational Science and Engineering. IEEE Computer Society. pp: 305–312.
  8. Organization for the Advancement of Structured Information Standards (OASIS) (in Chinese).
  9. Di Pietro R, Mancini LV. & Ateniese G. 2008. Scalable and efficient provable data possession. In: Levi A, ed. Proc. of the 4th Int’l Conf. on Security and Privacy in Communication Netowrks. Turkey: ACM DL.
  10. Liu C. & Wang F. 2014. In-orbit estimation of inertia parameters of target satellite after capturing the tracking satellite.//Intelligent Control and Automation (WCICA), 2014 11th World Congress on. IEEE, 3940–3945.
  11. Zhou M, Zhang R. & Xie W, et al. 2010. Security and privacy in cloud computing: A survey[C]//Semantics Knowledge and Grid (SKG), 2010 Sixth International Conference on. IEEE, 105–112.
  12. Sabahi F.2011. Cloud computing security threats and responses[C]. // Communication Software and Networks (ICCSN), 2011 IEEE 3rd International Conference on. IEEE: 245 - 249.
  13. Liu C, Wang F. & Zhang Z.2014. Mixed H2/H∞ control for a satellite based on LMI[C]. // Mechatronics and Control (ICMC), 2014 IEEE International Conference on. IEEE, 2114–2118.
  14. Pearson S. Privacy, security and trust in cloud computing.//Privacy and Security for Cloud Computing. Springer London, 2013: 3–42.
  15. Sweeney L. k-anonymity: A model for protecting privacy. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2002, 10(05): 557–570. [CrossRef]
  16. Tene O. & Polonetsky J. 2012. Big data for all: Privacy and user control in the age of analytics. Nw. J. Tech. & Intell. Prop. 11.
  17. Shi K. &Liu C, et al. 2015. Mixed H2/H∞ Approach of Full Order State Observer Design for Satellite Attitude Control System[C]//Control and Decision Conference (2015 CCDC), The 27th Chinese. IEEE.
  18. Kumar K V, Reddy D N C S. & Reddy B S.2015. Preserving Data Privacy, Security Models and Crypto-graphic Algorithms in Cloud Computing. International Journal of Computer Engineering and Applications, 7(1).