[1] |
李瑞轩, 董新华, 辜希武 等. 移动云服务的数据安全与隐私保护综述[J]. 通信学报, 2013,34(12): 159-166. LI R X , DONG X H , GU X W ,et al. Overview of the data security and privacy preserving of mobile cloud services[J]. Journal on Communications, 2013,34(12): 159-166.
|
[2] |
冯登国, 张敏, 张妍 等. 云计算安全研究[J]. 软件学报, 2011,22(1): 71-83. FENG D G , ZHANG M , ZHANG Y ,et al. Study on cloud computing security[J]. Journal of Software, 2011,22(1): 71-83.
|
[3] |
SHAMIR A . Identity-based cryptosystems and signature schemes[A]. Advances in Cryptology[C]. Springer, 1985. 47-53.
|
[4] |
SAHAI A , WATERS B . Fuzzy identity-based encryption[A]. Advances in Cryptology–EUROCRYPT 2005[C]. 2005. 557-557.
|
[5] |
GOYAL V , PANDEY O , SAHAI A ,et al. Attribute-based encryption for fine grained access control of encrypted data[A]. CCS[C]. 2006. 89-98.
|
[6] |
苏金树, 曹丹, 王小峰 . 等 属性基加密机制[J]. 软件学报, 2011,22(6): 1299-1315. SU J S , CAO D , WANG X F ,et al. Attribute-based encryption schemes[J]. Journal of Software, 2011,22(6): 1299-1315.
|
[7] |
YU S,WANG C , REN K , LOU W . Achieving secure,scalable,and fine-grained data access control in cloud computing[A]. IEEE INFOCOM[C]. 2010. 1-9.
|
[8] |
俞能海, 郝卓, 徐甲甲 . 等 云安全研究进展综述[J]. 电子学报, 2013,41(2): 371-381. YU N H , HAO Z , XU J J ,et al. Review of cloud computing security[J]. Acta Electronica Sinica, 2013,41(2): 371-381.
|
[9] |
BETHENCOURT J , SAHAI A , WATERS B . Ciphertext-policy attribute-based encryption[A]. IEEE S;P 2007. 321-334.
|
[10] |
WANG G J , LIU Q , WU J . Hierarchical attribute-based encryption for fine-grained access control in cloud storage services[A]. CCS[C]. 2010. 735-737.
|
[11] |
CHASE M . Multi-authority attribute based encryption[A]. Theory of Cryptography[C]. 2007. 515-534.
|
[12] |
CHASE M , CHOW S . Improving privacy and security in multi- authority attribute based encryption[A]. CCS[C]. 2009. 121-130.
|
[13] |
LI M , YU S C , ZHENG Y ,et al. Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption[J]. IEEE Transactions on Parallel and Distributed Systems, 2013,24(1): 131-143.
|
[14] |
JUNG T,LI X , WAN Z , WAN M . Privacy preserving cloud data access with multi-authorities[A]. IEEE INFOCOM[C]. 2013. 2625-2833.
|
[15] |
BLAZE M , BLEUMER G , STRAUSS M . Divertible protocols and atomic proxy cryptography[A]. Proc of EUROCRYPT[C]. 1998. 127-144.
|
[16] |
DAN B , MATTHEW K F . Identity-based encryption from the Weil pairing[A]. Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology[C]. 2001. 213-229.
|
[17] |
BEIMEL A . Secure Schemes for Secret Sharing and Key Distribution[D]. Haifa,Israel,Israel Institute of Technology, 1996.
|
[18] |
洪澄, 张敏, 冯登国 . AB-ACCS:一种云存储密文访问控制方法[J]. 计算机研究与发展, 2010,47(z1): 259-265. HONG C , ZHANG M , FENG D G . A cryptographic access control scheme for cloud storage[J]. Journal of Computer Research and Development, 2010,47(z1): 259-265.
|
[19] |
IMERCATI S D C , FORESTI S , JAJODIA S ,et al. Over-encryption:management of access control evolution on outsourced data[A]. Proc of VLDB’07[C]. 2007. 123-134.
|