Computer Science ›› 2024, Vol. 51 ›› Issue (11A): 240400040-10.doi: 10.11896/jsjkx.240400040
• Information Security • Previous Articles Next Articles
YUE Meng1, WEN Cheng1, HONG Xueting2, YAN Simin1
CLC Number:
[1]Best Practices for Loadable Software Management and Configuration Control[R].International Air Transport Association Engineering and Maintenance Group,2013:1-3. [2]QUAN Y Q.Research on Architecture Design and Safety Ana-lysis of Avionics Architecture Databus Network for Commercial Aircraft[C]//Proceedings of 2018 3rd International Workshop on Materials Engineering and Computer Sciences(IWMECS 2018).2018:39-45. [3]AMARNATH J,SURYA M,BHARGAV P,et al.Cloud com-puting in Aircraft Data Network[C]//2011 Integrated Communications,Navigation,and Surveillance Conference Proceedings.Herndon:IEEE Press,2011:E7-1-E7-8. [4]FAN C,HAN Z,ZHAO L.Research on Cloud Storage Techno-logy of Avionics System[J].Electronics Optics & Control,2022,29(3):69-74,80. [5]Arinc Report 835-1:Guidance for Security of Loadable Software Parts Using Digital Signatures[S].ARINC Airlines Electronic Engineering Committee.2014:10-29. [6]LIU J,HUANG K,RONG H,et al.Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage[J].IEEE Transactions on Information Forensics and Security,2015,10(7):1513-1528. [7]BARSOUM A F,HASAN M A.Provable Multicopy DynamicData Possession in Cloud Computing Systems[J].IEEE Transactions on Information Forensics and Security,2015,10(3):485-497. [8]YU J,REN K,WANG C,et al.Enabling Cloud Storage Auditing with Key-Exposure Resistance[J].IEEE Transactions on Information Forensics and Security,2015,10(6):1167-1179. [9]YANG K,JIA X.An Efficient and Secure Dynamic AuditingProtocol for Data Storage in Cloud Computing[J].IEEE Transactions onParallel and Distributed Systems,2013,24(9):1717-1726. [10]ZHU Y,HU H,AHN G J,et al.Efficient Audit Service Outsourcing for Data Integrity in Clouds[J].Journal of Systems and Software,2012,865(5):1083-1095. [11]WANG J,CHEN X,HUANG X,et al.Verifiable Auditing for Outsourced Database in Cloud Computing[J].IEEE Transactions on Computers,2015,64(11):3293-3303. [12]LIU C,RANJAN R,YANG C,et al.MuRDPA:Top-Down Levelled Multi-Replica Merkle Hash Tree Based Secure Public Auditing for Dynamic Big Data Storage on Cloud[J].IEEE Transactions on Computers,2015,64(9):2609-2622. [13]WANG H Q.Identity-Based Distributed Provable Data Possession in Multicloud Storage[J].IEEE Transactions on Services Computing,2015,8(2):328-340. [14]WANG H Q,WU Q H,QIN B,et al.Identity-Based RemoteData Possession Checking in Public Clouds[J].IET Information Security,2014,8(2):114-121. [15]GUDEME J R,PASUPULETI S K,KANDUKURI R.Attribute-Based Public Integrity Auditing for Shared Data with Efficient User Revocation in Cloud Storage[J].Journal of Ambient Intelligence and Humanized Computing,2020,12(2):2019-2032. [16]YU Y,LI Y N,YANG B,et al.Attribute-Based Cloud Data Integrity Auditing for Secure Outsourced Storage[J].IEEE Transactions on Emerging Topics in Computing,2020,8(2):377-390. [17]ZHANG Y,YU J,HAO R,et al.Enabling Efficient User Revocation inIdentity-Based Cloud Storage Auditing for Shared Big Data[J].IEEE Transactions on Dependable and Secure Computing,2020,17(3):608-619. [18]REHMAN A,LIU J,YASIN M Q,et al.Securing Cloud Storage by Remote Data Integrity Check with Secured Key Generation[J].Chinese Journal of Electronics,2021,30(3):489-499. [19]YOOSUF M S,ANITHA R.LDuAP:lightweight dual auditing protocol to verify dataintegrity in cloud storage servers[J].Journal of Ambient Intelligence and Humanized Computing,2022,13:3787-3805. [20]LI WH,HAN C,ZHAO Y K,et al.Distributed Integrated Modular Avionics System Architecture Design[C]//Proceedings of the Ninth China Aviation Society Youth Science and Technology Forum.Beijing:China Aviation Publishing & Media CO.2020:971-977. [21]LIU Y,JIN X,WEI X H.System Management Function Design Based on Distributed Avionics System[J].Electronics Optics & Control,2022,29(9):74-77,95. [22]Arinc Report 667-2:Guidance for Management of Field Loadable Software[S].ARINC Airlines Electronic Engineering Committee.2017:9-23. [23]Arinc Report 665-3:Loadable Software Standards[S].ARINC Airlines Electronic Engineering Committee.2005:6-26. |
[1] | YUE Meng, ZHU Shibo, HONG Xueting, DUAN Bingyan. Airborne Software Audit Method Based on Trusted Implicit Third Party [J]. Computer Science, 2024, 51(6A): 230400088-6. |
[2] | WANG Yi, HU Xuexian, WEI Jianghong. Two-factor Authentication Scheme for Blind Cloud Storage System Based on Password and SmartCard [J]. Computer Science, 2024, 51(1): 363-370. |
[3] | WANG Shaohui, ZHAO Zhengyu, WANG Huaqun, XIAO Fu. Analysis and Improvement on Identity-based Remote Data Integrity Verification Scheme [J]. Computer Science, 2023, 50(7): 302-307. |
[4] | SHEN Zhen, ZHAO Cheng-gui. Storage Task Allocation Algorithm in Decentralized Cloud Storage Network [J]. Computer Science, 2022, 49(12): 17-21. |
[5] | XU Kun, FU Yin-jin, CHEN Wei-wei, ZHANG Ya-nan. Research Progress on Blockchain-based Cloud Storage Security Mechanism [J]. Computer Science, 2021, 48(11): 102-115. |
[6] | LI Ying, YU Ya-xin, ZHANG Hong-yu, LI Zhen-guo. High Trusted Cloud Storage Model Based on TBchain Blockchain [J]. Computer Science, 2020, 47(9): 330-338. |
[7] | CHEN Li-feng, ZHU Lu-ping. Encrypted Dynamic Configuration Method of FPGA Based on Cloud [J]. Computer Science, 2020, 47(7): 278-281. |
[8] | ZHANG Xi, WANG Jian. Public Integrity Auditing for Shared Data in Cloud Supporting User Identity Tracking [J]. Computer Science, 2020, 47(6): 303-309. |
[9] | LI Long-fei,ZHANG Jing-zhou,WANG Peng-de,GUO Peng-jun. P2P Network Search Mechanism Based on Node Interest and Q-learning [J]. Computer Science, 2020, 47(2): 221-226. |
[10] | LI Shu-quan,LIU Lei,ZHU Da-yong,XIONG Chao,LI Rui. Protocol of Dynamic Provable Data Integrity for Cloud Storage [J]. Computer Science, 2020, 47(2): 256-261. |
[11] | BAI Li-fang, ZHU Yue-fei, LU Bin. Research and Development of Data Storage Security Audit in Cloud [J]. Computer Science, 2020, 47(10): 290-300. |
[12] | QIAO Mao,QIN Ling. AB-ACCS Scheme for Revocation of Efficient Attributes in Cloud Storage Services [J]. Computer Science, 2019, 46(7): 96-101. |
[13] | WU Dan-dan, LYU Xin. Location Anonymous Algorithm Based on User Collaboration under Distributed Structure [J]. Computer Science, 2019, 46(4): 158-163. |
[14] | XIE Si-jiang,JIA Bei,WANG He,XU Shi-cong. Cloud Big Data Integrity Verification Scheme Based on Multi-branch Tree [J]. Computer Science, 2019, 46(3): 188-196. |
[15] | GU Chen-yang, FU Wei, LIU Jin-long, SUN Gang. Survey of ORAM Research in Cloud Storage [J]. Computer Science, 2019, 46(11A): 341-347. |
|