[1] |
SAHAI A , WATERS B . Fuzzy identity-based encryp-tion[C]// Advances in Cryptology - Eurocrypt 2005. Springer, Berlin Heidelberg, c2005:457-473.
|
[2] |
GOYAL O P V , SAHAI A , WATERS B . Attribute based encryption for fine-grained access conrol of encrypted data[C]// 13th ACM Confe-rence on Computer and Communications Security. Alexandria, c2006:89-98.
|
[3] |
BETHENCOURT J , SAHAI A , WATERS B . Ciphertext-policy attribute-based encryption[C]// IEEE Symposium on Security and Pri-vacy. California,IEEE, c2007:321-334.
|
[4] |
LEWKO A , OKAMOTO T , SAHAI A , et al. Fully secure functional. encryption: attribute-based encryption and (hierarchical) inner product encryption[C]// Advances in Cryptology EUROCRYPT 2010. Springer, Berlin Heidelberg, c2010:62-91.
|
[5] |
DENG H , WU Q , QIN B . Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts[J]. Information Sciences, 2014,275(8): 370-384.
|
[6] |
LI M , YU S C , ZHENG Y . Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption[J]. IEEE Transactions on Parallel and Distributed Systems, 2013,24(1): 131-143.
|
[7] |
FERRARA A L , FUCHSBAUER G , WARINSCHI B . Cryptographi-cally Enforced RBAC[C]// IEEE 26th Computer Security Foundations Symposium (CSF).Louisiana,IEEE, c2013:115-129.
|
[8] |
ZHAO F , NISHIDE T , SAKURAI K . Realizing fine-grained and flexible access control to outsourced data with attribute-based crypto-systems[C]// IInformation Security Practice and Experience. Springer, Berlin Heidelberg, c2011:83-97.
|
[9] |
RUJ S , STOJMENOVIC M , NAYAK A . Decentralized access control with anonymous authentication of data stored in clouds[J]. IEEE Trans-actions on Parallel and Distributed Systems, 2014,25(2): 384-394.
|
[10] |
HUR J , KANG K . Secure data retrieval for decentralized disrup-tion-tolerant military networks[J]. IEEE/ACM Transactions o Net-working, 2014,(22):16-26.
|
[11] |
YANG K , JIA X H , REN K , et al. DAC-MACS: effective data access control for multi-authority cloud storage systems[C]// INFOCOM 2013. Turin,IEEE, c2013:2895-2903.
|
[12] |
YANG K , JIA X , REN K . Enabling efficient access contro with dy-namic policy updating for big data in the cloud[C]// INFOCOM 2014. Toronto,IEEE, c2014:2013-2021.
|
[13] |
HERRANZ J , RUIZ A , SáEZ G . New results and applications for multi-secret sharing schemes[J]. Designs, Codes and Cryptography, 2013,73(3): 841-864.
|
[14] |
LEWKO A , WATERS B . New proof methods for attribute-based encryption: achieving full security through selective techniques[C]// Advances in Cryptology CRYPTO 2012. California: Springer, c2012:180-198.
|
[15] |
郭树行, 张禹 . 基于动态情景网关的系统协同访问控制模型[J]. 通信学报, 2013,34(Z1):142-147. GUO S X , ZHANG Y . Dynamic situation gateway based system co-operations access gated model[J]. Journal on Communications, 2013,34(Z1):142-147.
|
[16] |
林果园, 贺珊, 黄皓 . 基于行为的云计算访问控制安全模型[J]. 通信学报, 2012,33(3):59-66. LIN G Y , HZ S , HUANG H . Access control security model based on behavior in clond computing environment[J]. Journd on Communica-tions, 2012,33(3):59-66.
|
[17] |
SHI J L , et al. An access control scheme with direct cloud-aided attribute revocation using version key[C]// ICA3PP 2014. Dalian, Springer International Publishing, c2014:429-442.
|