[1] |
CHOW C Y , MOKBEL M F , AREF W G . Casper:query processing for location services without compromising privacy[C]//32nd Interna-tional Conference on Very Large Data Bases. 2006:763-774.
|
[2] |
KIDO H , YANAGISAWA Y , SATOH T . An anonymous communica-tion technique using dummies for location-based ser-vices[C]//Pervasive Services. 2005:88-97.
|
[3] |
MAN L Y , JENSEN C S , HUANG X , et al. SpaceTwist:managing the trade-offs among location privacy,query performance,and query ac-curacy in mobile services[J]. Icde, 2008:366-375.
|
[4] |
GRUTESER M , GRUNWALD D . Anonymous usage of location-based services through spatial and temporal cloaking[C]//International Confer-ence on Mobile Systems,Applications,and Services. 2003:31-42.
|
[5] |
陈伟鹤, 李文静, 朱江 . 基于社交网络好友攻击的位置隐私保护模型[[J]. 计算机工程与科学, 2015,37(4):692-698. CHEN W H , LI W J , ZHU J . A model for protecting location privacy against attacks from friends in SNS[J]. Computer Engineering&Sci-ence, 2015,37(4):692-698.
|
[6] |
BONEH D , FRANKLIN F . Identity-based encryption from the Wail pairing[J]. Advances in Cryptology-Crypt, 2001,32(3):586-615.
|
[7] |
BETHENCOURT J , SAHAI A , WATERS B . Ciphertext-policy attrib-ute-based encryption[C]//28th International Symposium on Security and Privacy(S&P2007). Berkeley,CA,USA, 2007:321-334.
|
[8] |
BEIMEL A . Secure schemes for secret sharing and key distribution[J]. International Journal of Pure&Applied Mathematics, 1996.
|
[9] |
WATERS B . Ciphertext-policy attribute-based encryption:an expres-sive,efficient,and provably secure realization[J]. Lecture Notes in Computer Science, 2011:321-334.
|
[10] |
LIANG X , LI X , LU R , et al. An efficient and secure user revocation scheme in mobile social networks[C]//Global Telecommunications Conference (GLOBECOM 2011). 2011:1-5.
|
[11] |
HUR J , NOH D K . Attribute-based access control with efficient revo-cation in data outsourcing systems[J]. IEEE Transactions on Parallel &Distributed Systems, 2010,22(7): 1214-1221.
|
[12] |
吕志泉, 洪澄, 张敏 , 等. 面向社交网络的隐私保护方案. 通信学报, 2014,35(8):23-32. LYU Z Q , HONG C , ZHANG M , et al. Privacy-perserving scheme for social networks[J]. Journal on Communications, 2014,35(8):23-32.
|
[13] |
YU S , WANG C , REN K , et al. Attribute based data sharing with attribute revocation[C]//5th ACM Symposium on Information,Com-puter and Communications Security. Beijing,China, 2010:261-270.
|
[14] |
JAHID S , MITTAL P , BORISOV N . EASiER:Encryption-based access control in social networks with efficient revocation[C]//ACM Symposium on Information,Computer and Communications Security. 2011:411-415.
|
[15] |
ZHANG M , LYU Z , FENG D , et al. A secure and efficient revocation scheme for fine-grained access control in cloud storage[C]//2012 IEEE 4th International Conference on Cloud Computing Technology and Science (CloudCom). 2012:545-550.
|