[1] |
RIVERA D , GARCíA M L , MARTíN-RUíZ M L ,et al Secure communications and protected data for a Internet of things smart toyplatform[J]. IEEE Internet of Things Journal, 2019,6(2): 3785-3795.
|
[2] |
SAHAIA , WATERS B , . Fuzzy identity-based encryption[C]// Annual International Conference on Theory and Applications of Cryptographic Tchniques. Springer, 2005: 457-473.
|
[3] |
WATERS B , . Ciphertext-policy attribute-based encryption:an expressive,efficient,and provably secure realization[C]// International Workshop on Public Key Cryptography. Springer, 2008: 321-334.
|
[4] |
BETHENCOURT J , SAHAI A , WATERS B . Ciphertext-policy attribute-based encryption[C]// IEEE symposium on Security and Privacy. IEEE, 2007: 321-334.
|
[5] |
LUAN I , PETKOVIC M , NIKOVA S ,et al. Mediated ciphertext-policy attribute-based encryption and its application[C]// Information Security Applications,10th International Workshop. 2009: 309-323.
|
[6] |
YU S , WANG C , REN K ,et al. Attribute based data sharing with attribute revocation[C]// TheInternational Symposium on ACM Symposium on Information,Computer and communications security. ACM, 2010: 261-270.
|
[7] |
WU X , JIANG R , BHARGAVA B . On the security of data access control for multiauthority cloud storage systems[J]. IEEE Transactions on Services Computing, 2015,10(2): 285-272.
|
[8] |
FAN K , WANG J , WANG X ,et al. Secure,efficient and revocable data sharing scheme for vehicular fogs[J]. Peer-to-Peer Networking and Applications, 2018,11(4): 766-777.
|
[9] |
LI J , YAO W , ZHANG Y ,et al. Flexible and fine-grained attribute-based data storage in cloud computing[J]. IEEE Transactions on Services Computing, 2016,10(5): 785-796.
|
[10] |
FAN K , WANG J , WANG X ,et al. Proxy-assisted access control scheme of cloud data for smart cities[J]. Personal & Ubiquitous Computing, 2017,21(5): 937-947.
|
[11] |
HUR J , NOH D K . Attribute-based access control with efficient revocation in data outsourcing systems[J]. IEEE Transactions on Parallel and Distributed Systems, 2011,22(7): 1214-1221.
|
[12] |
LI J , YAO W , HAN J ,et al. User collusion avoidance CP-ABE with efficient attribute revocation for cloud storage[J]. IEEE Systems Journal, 2017,12(2): 1767-1777.
|
[13] |
强衡畅, 王晓明 . 一种高效细粒度云存储访问控制方案[J]. 计算机与数字工程, 2014,42(9): 1673-1677.
|
|
QIANG H C , WANG X M . Fine-grained access control with efficient revocation in cloud storage[J]. Computer and Digital .Engineering, 2014,42(19): 1673-1677.
|
[14] |
林娟 . 可撤销的属性基加密技术的研究[D]. 上海:上海交通大学, 2014.
|
|
LIN J . Research on revocable attribute based encryption technology[D]. Shanghai:Shanghai Jiaotong University, 2014.
|
[15] |
IMINE Y , LOUNIS A , BOUABDALLAH A . Revocable attribute-based access control in mutli-autority systems[J]. Journal of Network and Computer Applications, 2018,122: 61-76.
|
[16] |
BEIMEL A . Secure schemes for secret sharing and key distribution[J]. International Journal of Pure & Applied Mathematics, 1996.
|
[17] |
ODELU V , DAS A K , KHURRAM KHAN M ,et al. Expressive CP-ABE scheme for mobile devices in IOT satisfying constant-size keys and ciphertexts[J]. IEEE Access, 2017(5): 3273-3283.
|
[18] |
王一兵 . 物联网技术在营运车辆安全监管中的应用[J]. 计算机时代, 2018(3): 35-37.
|
|
WANG Y B . Application of Internet of things technology in safety supervision of operation vehicles[J]. Journal of Computer, 2018(3): 35-37.
|
[19] |
YANG Y , ZHONG M , YAO H ,et al. Internet of things for smart ports:technologies and challenges[J]. IEEE Instrumentation and Measurement Magazine, 2018,21(1): 34-43.
|
[20] |
VAANCHIG N , CHEN W , QIN Z . Ciphertext-policy attribute-based access control with effective user revocation for cloud data sharing system[C]// International Conference on Advanced Cloud & Big Data. IEEE, 2017: 186-193.
|