[1] |
CHRISTIAN C , IDIT K , ALEXANDER S T . Trusting the cloud[J]. ACM SIGACT News Archive, 2009,40(2):81-86.
|
[2] |
ERIC Y , JIN T , HAMILTON B A . Attributed based access control (ABAC) for web services[A]. Proceedings of the IEEE International Conference on Web Services[C]. Orlando Florida,USA, 2005.7.
|
[3] |
SAHAI A , WATERS B . Fuzzy identity based encryption[J]. LNCS, 2005,3494(1):457-473.
|
[4] |
YU S C , WANG C , REN K . Achieving secure, scalable, and fine-grained data access control in cloud computing[A]. Proceedings of the 2010 IEEE INFOCOM[C]. Piscataway, NJ, USA, 2010.534-542.
|
[5] |
BETHENCOURT J , SAHAI A , WATERS B . Ciphertext-policy attrib-ute-based encryption[A]. Proceedings of 2007 IEEE Symposium on Security and Privacy[C]. Berkeley, USA, 2007.321-334.
|
[6] |
MALEK B , MIRI A . Combining attribute-based and access sys-tems[A]. Proceedings of 12th IEEE Int′l Conf on Computational Sci-ence and Engineering[C]. Vancouver, Canada, 2009.305-312.
|
[7] |
洪澄, 张敏, 冯登国 . 面向云存储的高效动态密文访问控制[J]. 通信学报, 2011,32(7):90-98. HONG C , ZHANG M , FENG D G . Achieving effitient dynamic cryp-tographic access control in cloud storage[J]. Joumal on Communica-tions, 2011,32(7):90-98.
|
[8] |
OASIS eXtensible access control markup language (XACML)[EB/OL]. .
|
[9] |
GOYAL V , PANDEY O , SAHAI A . Attibute-based encryption for fine-grained access control of encrypted data[A]. Proceedings of the 13th ACM Conference on Computer and Communications Security[C]. New York, USA, 2006.89-98.
|
[10] |
WAN Z G , LIU J , DENG R H . HASBE: a hierarchical attribute-based solution for flexible and scalable access control in cloud computing[J]. IEEE Transactions on Information Forensics and Security, 2012,7(2):743-754.
|
[11] |
洪澄, 张敏, 冯登国 . AB-ACCS:一种云存储密文访问控制方法[J]. 计算机研究与发展, 2010,47:259-265. HONG C , ZHANG M , FENG D G . AB-ACCS: a cryptographic access control scheme for cloud storage[J]. Journal of Computer Research and Development, 2010,47:259-265.
|
[12] |
HUR J B , NOH D K . Attribute-based access control with efficient revocation in data outsourcing systems[J]. IEEE Transactions on Par-allel and Distributed Systems, 2011,22(7):1214-1221.
|
[13] |
WANG G J , LIU Q , WU J . Hierarchical attribute-based encryption for fine-grained access control in cloud storage services[A]. Proceedings of the 17th ACM Conference on Computer and Communications secu-rity[C]. New York, USA, 2010.735-737.
|
[14] |
Brief introduction to XACML[EB/OL]. .
|
[15] |
XACML open source project SUNXACML[EB/OL]. .
|
[16] |
XACML open source project NDG-XACML[EB/OL]. .
|
[17] |
Advanced crypto software collection[EB/OL]. .
|
[18] |
XACML open source project enterprise XACML[EB/OL]. .
|
[19] |
XACML open source project XEngine[EB/OL]. .
|
[20] |
XACML 2.0 conformance tests[EB/OL]. .
|