[14] |
SU M , LI F , SHI G ,et al. A user-centric data secure creation scheme in cloud computing[J]. Chinese Journal of Electronics, 2016,25(4): 753-760.
|
[15] |
TANG Q , . Type-based proxy re-encryption and its construction[C]// International Conference on Cryptology in India:Progress in Cryptology. 2008: 130-144.
|
[1] |
李凤华, 殷丽华, 吴巍 ,等. 天地一体化信息网络安全保障技术研究进展及发展趋势[J]. 通信学报, 2016,37(11): 156-168.
|
|
LI F H , YIN L H , WU W ,et al. Research status and development trends of security assurance for space-ground integration information network[J]. Journal on Communications, 2016,37(11): 156-168.
|
[2] |
JHA S , SURAL S , VAIDYA J ,et al. Security analysis of temporal RBAC under an administrative model[J]. Computers & Security, 2014(46): 154-172.
|
[3] |
杨柳, 唐卓, 李仁发 ,等. 云计算环境中基于用户访问需求的角色查找算法[J]. 通信学报, 2011,32(7): 169-175.
|
|
YANG L , TANG Z , LI R F ,et al. Roles query algorithm in cloud computing environment based on user require[J]. Journal on Communications, 2011,32(7): 169-175.
|
[4] |
LUO J , WANG H , GONG X ,et al. A novel role-based access control model in cloud environments[J]. International Journal of Computational Intelligence Systems, 2016,9(1): 1-9.
|
[5] |
LI J W , SQUICCIARINI A , LIN D J ,et al. SecLoc:securing location-sensitive storage in the cloud[C]// The 20th ACM Symposium on Access Control Models and Technologies. 2015: 51-61.
|
[6] |
ZHOU L , VARADHARAJAN V , HITCHENS M . Trust enhanced cryptographic role-based access control for secure cloud data storage[J]. IEEE Transactions on Information Forensics and Security, 2015,10(11): 2381-2395.
|
[7] |
ZHOU L , VARADHARAJAN V , GOPINATH K . A secure role-based cloud storage system for encrypted patient-centric health records[J]. Computer Journal, 2016,59(11): 1593-1611.
|
[8] |
XU P , JIAO T , WU Q ,et al. Conditional identity-based broadcast proxy re-encryption and its application to cloud email[J]. IEEE Transactions on Computers, 2015,65(1): 66-79.
|
[9] |
ZHANG Y , LI J , CHEN X ,et al. Anonymous attribute based proxy re-encryption for access control in cloud computing[J]. Security and Communication Networks, 2016,9(14): 2397-2411.
|
[10] |
LI J , ZHAO X , ZHANG Y ,et al. Provably secure certificate-based conditional proxy re-encryption[J]. Journal of Information Science &Engineering, 2016,32(4): 813-830.
|
[11] |
LIU Q , WANG G , WU J . Time-based proxy re-encryption scheme for secure data sharing in a cloud environment[J]. Information Sciences, 2014,258(3): 355-370.
|
[12] |
YANG Y , LU H , WENG J ,et al. Fine-grained conditional proxy re-encryption and application[C]// International Conference on Provable Security. 2014: 206-222.
|
[13] |
苏铓, 史国振, 谢绒娜 ,等. 面向移动云计算的多要素代理重加密方案[J]. 通信学报, 2015,36(11): 73-79.
|
|
SU M , SHI G Z , XIE R N ,et al. Multi-element based on proxy re-encryption scheme for mobile cloud computing[J]. Journal on Communications, 2015,36(11): 73-79.
|
[16] |
YANG K , LIU Z , JIA X ,et al. Time-domain attribute-based access control for cloud-based video content sharing:a cryptographic approach[J]. IEEE Transactions on Multimedia, 2016,18(5): 940-950.
|