Open Access
MATEC Web of Conferences
Volume 22, 2015
International Conference on Engineering Technology and Application (ICETA 2015)
Article Number 01041
Number of page(s) 4
Section Information and Communication Technology
Published online 09 July 2015
  1. Liu C, et al. 2014. Robust H∞ Control for satellite attitude control system with uncertainties and additive perturbation. International Journal of Science, 1(2): 1–9. [Google Scholar]
  2. Distributed Management Task Force (DMTF) (in Chinese). [Google Scholar]
  3. Cloud Security Alliance (in Chinese). [Google Scholar]
  4. How to protect personal privacy in the big data era. [Google Scholar]
  5. Chang Y.C. & Mitzenmacher M. 2005. Privacy preserving keyword searches on remote encrypted data. In: Ioannidis J, Keromytis AD, Yung M, eds. LNCS 3531. New York: Springer-Verlag, pp: 442−455. [Google Scholar]
  6. Liu C, Wang F. & Shi K, et al. 2014. Simulations for orbital maintenance of low-angle satellite based on STK. Energy Education Science and Technology Part A: Energy Science and Research, 32(6): 6307–6316. [Google Scholar]
  7. Malek B. & Miri A.2009. Combining attribute-based and access systems. In: Muzio JC, Brent RP, eds. Proc. IEEE CSE 2009, 12th IEEE Int’l Conf. on Computational Science and Engineering. IEEE Computer Society. pp: 305–312. [Google Scholar]
  8. Organization for the Advancement of Structured Information Standards (OASIS) (in Chinese). [Google Scholar]
  9. Di Pietro R, Mancini LV. & Ateniese G. 2008. Scalable and efficient provable data possession. In: Levi A, ed. Proc. of the 4th Int’l Conf. on Security and Privacy in Communication Netowrks. Turkey: ACM DL. [Google Scholar]
  10. Liu C. & Wang F. 2014. In-orbit estimation of inertia parameters of target satellite after capturing the tracking satellite.//Intelligent Control and Automation (WCICA), 2014 11th World Congress on. IEEE, 3940–3945. [Google Scholar]
  11. Zhou M, Zhang R. & Xie W, et al. 2010. Security and privacy in cloud computing: A survey[C]//Semantics Knowledge and Grid (SKG), 2010 Sixth International Conference on. IEEE, 105–112. [Google Scholar]
  12. Sabahi F.2011. Cloud computing security threats and responses[C]. // Communication Software and Networks (ICCSN), 2011 IEEE 3rd International Conference on. IEEE: 245 - 249. [Google Scholar]
  13. Liu C, Wang F. & Zhang Z.2014. Mixed H2/H∞ control for a satellite based on LMI[C]. // Mechatronics and Control (ICMC), 2014 IEEE International Conference on. IEEE, 2114–2118. [Google Scholar]
  14. Pearson S. Privacy, security and trust in cloud computing.//Privacy and Security for Cloud Computing. Springer London, 2013: 3–42. [Google Scholar]
  15. Sweeney L. k-anonymity: A model for protecting privacy. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2002, 10(05): 557–570. [Google Scholar]
  16. Tene O. & Polonetsky J. 2012. Big data for all: Privacy and user control in the age of analytics. Nw. J. Tech. & Intell. Prop. 11. [Google Scholar]
  17. Shi K. &Liu C, et al. 2015. Mixed H2/H∞ Approach of Full Order State Observer Design for Satellite Attitude Control System[C]//Control and Decision Conference (2015 CCDC), The 27th Chinese. IEEE. [Google Scholar]
  18. Kumar K V, Reddy D N C S. & Reddy B S.2015. Preserving Data Privacy, Security Models and Crypto-graphic Algorithms in Cloud Computing. International Journal of Computer Engineering and Applications, 7(1). [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.