[1] |
ARMBRUST M , FOX A , GRIFFITH R ,et al. A view of cloud computing[J]. Communications of the ACM, 2010,53(4): 50-58.
|
[2] |
冯登国, 张敏, 张妍等 . 云计算安全研究[J]. 软件学报, 2011,22(1): 71-83. FENG D G , ZHANG M , ZHANG Y ,et al. Study on cloud computing security[J]. Journal of Software, 2011,22(1): 71-83.
|
[3] |
朱辉, 李晖, 苏万力 ,等. 基于身份的匿名无线认证方案[J]. 通信学报, 2009,30(4): 130-136. ZHU H , LI H , SU W L ,et al. ID-based wireless authentication scheme with anonymity[J]. Journal on Communications, 2009,30(4): 130-136.
|
[4] |
AGRAWAL R , SRIKANT R . Privacy-preserving data mining[J]. ACM Sigmod Record, 2000,29(2): 439-450.
|
[5] |
ZHU H , LIU T T , Wei G H ,et al. PPAS:privacy protection authentication scheme for VANET[J]. Cluster Computing, 2013,16(4): 873-886.
|
[6] |
SAHAI A , WATERS B . Fuzzy identity-based encryption[M]. Advances in Cryptology–EUROCRYPT 2005. Springer Berlin Heidelberg, 2005.
|
[7] |
BETHENCOURT J , SAHAI A , WATERS B . Ciphertext-policy attribute-based encryption[A]. Security and Privacy,SP'07[C]. 2007. 321-334.
|
[8] |
YU S , WANG C , REN K ,et al. Achieving secure,scalable,and fine-grained data access control in cloud computing[A]. INFOCOM,2010 Proceedings IEEE[C]. 2010. 1-9.
|
[9] |
LI M , YU S , ZHENG Y ,et al. Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption[J]. IEEE Transactions on Parallel and Distributed Systems, 2013,24(1): 131-143.
|
[10] |
AKINYELE J A , PAGANO M W , GREEN M D ,et al. Securing electronic medical records using attribute-based encryption on mobile devices[A]. Proceedings of the 1st ACM workshop on Security and Privacy in Smartphones and Mobile devices[C].ACM. 2011. 75-86.
|
[11] |
NARAYAN S , GAGNE M,SAFAVI-NANINI R . Privacy preserving EHR system using attribute-based infrastructure[A]. Proceedings of the 2010 ACM Workshop on Cloud Computing Security Workshop.[C]. ACM. 2010. 47-52.
|
[12] |
JAHID S , MITTAL P , BORISOV N . EASIER:Encryption-based access control in social networks with efficient revocation[A]. Proceedings of the 6th ACM Symposium on Information,Computer and Communications Security[C]. ACM. 2011. 411-415.
|
[13] |
XU Z , MARTIN K M . Dynamic user revocation and key refreshing for attribute-based encryption in cloud storage[A]. 2012 IEEE 11th International Conference on Trust,Security and Privacy in Computing and Communications[C]. 2012. 844-849.
|
[14] |
HUR J , NOH D K . Attribute-based access control with efficient revocation in data outsourcing system[J]. IEEE Transactions on Parallel and Distributed Systems, 2011,22(7): 1214-1221.
|
[15] |
DONG C , RUSSELLO G , DULAY N . Shared and searchable encrypted data for untrusted servers[M]. Data and Applications Security XXII. Springer Berlin Heidelberg, 2008.
|
[16] |
YANG Y , LU H , WENG J . Multi-user private keyword search for cloud computing[A]. 2011 IEEE Third International Conference on Cloud Computing Technology and Science (CloudCom).[C]. IEEE. 2011. 264-271.
|
[17] |
BEN L . PBC library[EB/OL]. .
|
[18] |
Openssl Team OpenSSL:The open source toolkit for SSL/TLS[EB/OL]. .
|
[19] |
BETHENCOURT J , SAHAI A , WATERS B . The cpabe toolkit[EB/OL]. .
|