Open Access
Issue
MATEC Web of Conferences
Volume 22, 2015
International Conference on Engineering Technology and Application (ICETA 2015)
Article Number 01041
Number of page(s) 4
Section Information and Communication Technology
DOI https://doi.org/10.1051/matecconf/20152201041
Published online 09 July 2015
  1. Liu C, et al. 2014. Robust H∞ Control for satellite attitude control system with uncertainties and additive perturbation. International Journal of Science, 1(2): 1–9.
  2. Distributed Management Task Force (DMTF) (in Chinese). http://www.dmtf.org/home
  3. Cloud Security Alliance (in Chinese). http://www.cloudsecurityalliance.org
  4. How to protect personal privacy in the big data era. http://zqb.cyol.com/html/2014-09/25/nw.D110000zgqnb_20140925_3-02.htm
  5. Chang Y.C. & Mitzenmacher M. 2005. Privacy preserving keyword searches on remote encrypted data. In: Ioannidis J, Keromytis AD, Yung M, eds. LNCS 3531. New York: Springer-Verlag, pp: 442−455.
  6. Liu C, Wang F. & Shi K, et al. 2014. Simulations for orbital maintenance of low-angle satellite based on STK. Energy Education Science and Technology Part A: Energy Science and Research, 32(6): 6307–6316.
  7. Malek B. & Miri A.2009. Combining attribute-based and access systems. In: Muzio JC, Brent RP, eds. Proc. IEEE CSE 2009, 12th IEEE Int’l Conf. on Computational Science and Engineering. IEEE Computer Society. pp: 305–312.
  8. Organization for the Advancement of Structured Information Standards (OASIS) (in Chinese). http://www.oasis-open.org/
  9. Di Pietro R, Mancini LV. & Ateniese G. 2008. Scalable and efficient provable data possession. In: Levi A, ed. Proc. of the 4th Int’l Conf. on Security and Privacy in Communication Netowrks. Turkey: ACM DL. http://eprint.iacr.org/2008/114.pdf
  10. Liu C. & Wang F. 2014. In-orbit estimation of inertia parameters of target satellite after capturing the tracking satellite.//Intelligent Control and Automation (WCICA), 2014 11th World Congress on. IEEE, 3940–3945.
  11. Zhou M, Zhang R. & Xie W, et al. 2010. Security and privacy in cloud computing: A survey[C]//Semantics Knowledge and Grid (SKG), 2010 Sixth International Conference on. IEEE, 105–112.
  12. Sabahi F.2011. Cloud computing security threats and responses[C]. // Communication Software and Networks (ICCSN), 2011 IEEE 3rd International Conference on. IEEE: 245 - 249.
  13. Liu C, Wang F. & Zhang Z.2014. Mixed H2/H∞ control for a satellite based on LMI[C]. // Mechatronics and Control (ICMC), 2014 IEEE International Conference on. IEEE, 2114–2118.
  14. Pearson S. Privacy, security and trust in cloud computing.//Privacy and Security for Cloud Computing. Springer London, 2013: 3–42.
  15. Sweeney L. k-anonymity: A model for protecting privacy. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2002, 10(05): 557–570. [CrossRef]
  16. Tene O. & Polonetsky J. 2012. Big data for all: Privacy and user control in the age of analytics. Nw. J. Tech. & Intell. Prop. 11.
  17. Shi K. &Liu C, et al. 2015. Mixed H2/H∞ Approach of Full Order State Observer Design for Satellite Attitude Control System[C]//Control and Decision Conference (2015 CCDC), The 27th Chinese. IEEE.
  18. Kumar K V, Reddy D N C S. & Reddy B S.2015. Preserving Data Privacy, Security Models and Crypto-graphic Algorithms in Cloud Computing. International Journal of Computer Engineering and Applications, 7(1).

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.