[1] |
孟小峰, 慈祥 . 大数据管理:概念、技术与挑战[J]. 计算机研究与发展, 2013,50(1): 146-169. MENG X F , CI X . Big data management:concepts,techniques and challenges[J]. Journal of Compute Research and Development, 2013,50(1): 146-169.
|
[2] |
冯登国, 张敏, 李昊 . 大数据安全与隐私保护[J]. 计算机学报, 2014,37(1): 246-258. FENG D G , ZHANG M , LI H . Big data security and privacy protection[J]. Chinese Journal of Computers, 2014,37(1): 246-258.
|
[3] |
SHAMIR A . Identity-based cryptosystems and signature schemes[A]. Proc of CYPTO'84[C]. Springer Berlin Heidelberg, 1985. 47-53.
|
[4] |
BONEH D , FRANKLIN M . Identity based encryption from the Weil pairing[A]. Proc of CRYPTO'01[C]. Springer Berlin Heidelberg, 2001. 213-229.
|
[5] |
COCKS C . An identity based encryption scheme based on quadratic residues[A]. Proc of Cryptography and Coding[C]. Springer Berlin Heidelberg, 2001. 360-363.
|
[6] |
SAKAI R , KASAHARA M . ID based cryptosystems with pairing on elliptic curve[J]. 2003,03/54
|
[7] |
CANETTI R , HALEVI S , KATZ J . A forward-secure public-key encryption scheme[A]. Proc of EUROCRYPT'03[C]. Springer Berlin Heidelberg, 2003. 255-271.
|
[8] |
CANETTI R , HALEVI S , KATZ J . Chosen-ciphertext security from identity-based encryption[A]. Proc of Cryptoloty-EUROCRYPT'04[C]. Springer Berlin Heidelberg, 2004. 207-222.
|
[9] |
BONEH D , BOYEN X . Efficient selective-ID secure identity-based encryption without random Oracle[A]. Proc of CryptolotyEUROCRYPT'04[C]. Springer Berlin Heidelberg, 2004. 223-238.
|
[10] |
BONEH D , BOYEN X . Efficient selective identity-based encryption without random oracles[J]. Journal of Cryptology, 2011,24(4): 659-693.
|
[11] |
BONEH D , BOYEN X . Secure identity based encryption without random oracles[A]. Proc of Cryptology-Crypto'04[C]. Springer Berlin Heidelberg, 2004. 443-359.
|
[12] |
WATERS B . Efficient identity-based encryption without random Oracles[A]. Proc of Cryptology-EUROCRYPT'05[C]. Springer Berlin Heidelberg, 2005. 114-127.
|
[13] |
GENTRY C . Practical identity-based encryption without random oracles[A]. Proc of Cryptology- EUROCRYPT'06[C]. Springer Berlin Heidelberg, 2006. 445-464.
|
[14] |
WATERS B . Dual system encryption:realizing fully secure IBE and HIBE under simple assumptions[A]. Proc of Cryptology-CRYPTO'09[C]. Springer Berlin Heidelberg, 2009. 619-636.
|
[15] |
GENTRY C , SILVERBERG A . Hierarchical ID-based cryptography[A]. Proc of Cryptology—ASIACRYPT'02[C]. Springer Berlin Heidelberg, 2002. 548-566.
|
[16] |
LEWKO A , WATERS B . New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts[M]. Theory of Cryptography. Springer Berlin Heidelberg, 2010.
|
[17] |
CHEN J , WEE H . Fully,(almost) tightly secure IBE and dual system groups[A]. Proc of Cryptology–CRYPTO 2013[C]. Springer Berlin Heidelberg, 2013. 435-460.
|
[18] |
CHOW S S M , DODIS Y , ROUSELAKIS Y ,et al. Practical leakage-resilient identity-based encryption from simple assumptions[A]. Proc of the 17th ACM Conference on Computer and Communications Security,CCS’10[C]. Chicago,Illinois,USA, 2010. 152-161.
|
[19] |
YUEN T H , CHOW S S M , ZHANG Y ,et al. Identity-based encryption resilient to continual auxiliary leakage[A]. Proc of Cryptology–EUROCRYPT 2012[C]. Springer Berlin Heidelberg, 2012. 117-134.
|
[20] |
SAHAI A , WATERS B . Fuzzy identity-based encryption[A]. Proc of Cryptology–EUROCRYPT'05[C]. Springer Berlin Heidelberg, 2005. 457-473.
|
[21] |
BOLDYREVA A , GOYAL V , KUMAR V . Identity-based encryption with efficient revocation[A]. Proc of the 15th ACM Conference on Computer and Communications Security[C]. 2008. 417-426.
|
[22] |
SEO J H , EMURA K . Revocable identity-based encryption revisited:security model and construction[A]. Proc of Public-Key Cryptography– PKC 2013[C]. Springer Berlin Heidelberg, 2013. 216-234.
|
[23] |
LI J , LI J , CHEN X ,et al. Identity-based encryption with outsourced revocation in cloud computing[J]. IEEE Transactions on Computers, 2015,64(2): 425-437.
|
[24] |
ABDALLA M , BIRKETT J , CATALANO D ,et al. Wildcarded identity-based encryption[J]. Journal of Cryptology, 2011,24(1): 42-82.
|
[25] |
BEATO F , MEUL S , PRENEEL B . Practical identity-based private sharing for online social networks[J]. Computer Communications, 2015, .
|
[26] |
WU X , XU L , ZHANG X . POSTER:a certificateless proxy re-encryption scheme for cloud-based data sharing[A]. Proc of the 18th ACM Conference on Computer and Communications Security,CCS'11[C]. 2011. 869-872.
|
[27] |
BYUN J W , BERTINO E , LI N . Purpose based access control of complex data for privacy protection[A]. Proc of the 10th ACM Symposium on Access Control Models and Technologies[C]. ACM, 2005. 102-110.
|
[28] |
BYUN J W , LI N . Purpose based access control for privacy protection in relational database systems[J]. The VLDB Journal, 2008,17(4): 603-619.
|
[29] |
YANG N , BARRINGER H , ZHANG N . A purpose-based access control model[A]. Proc of the 3rd International Symposium on Information Assurance and Security (IAS)[C]. IEEE, 2007. 143-148.
|
[30] |
KABIR M E , WANG H . Conditional purpose based access control model for privacy protection[A]. Proc.of the 20th Australasian Conference on Australasian Database[C]. Australian Computer Society,Inc, 2009. 135-142.
|
[31] |
WANG Y , ZHOU Z , LI J . A purpose-involved role-based access control model[A]. Foundations of Intelligent Systems[C]. Springer Berlin Heidelberg, 2014. 1119-1131.
|
[32] |
COLOMBO P , FERRARI E . Enforcement of purpose based access control within relational database management systems[J]. IEEE Transactions on Knowledge and Data Engineering, 2014,26(11): 2703-2716.
|
[33] |
SUN L , WANG H . A purpose-based access control in native XML databases[J]. Concurrency and Computation:Practice and Experience, 2012,24(10): 1154-1166.
|
[34] |
JAFARI M,SAFAVI-NAINI R , FONG P W L ,et al. A framework for expressing and enforcing purpose-based privacy policies[J]. ACM Transactions on Information and System Security, 2014,17(1): 3.
|
[35] |
渠世艳 . 基于目的管理的医疗信息系统访问控制模型研究[D]. 上海:上海交通大学, 2009. QU S Y . Research of Purpose-Based Access Control Model for Hospital Information System[D]. Shanghai:Shanghai Jiaotong University, 2009.
|
[36] |
KABIR M E , WANG H , BERTINO E . A role-involved purpose-based access control model[J]. Information Systems Frontiers, 2012,14(3): 809-82.
|