- Home
- Publications
- Publication Search
- Publication Details
Title
Attribute-based Encryption for Cloud Computing Access Control
Authors
Keywords
-
Journal
ACM COMPUTING SURVEYS
Volume 53, Issue 4, Pages 1-41
Publisher
Association for Computing Machinery (ACM)
Online
2020-07-07
DOI
10.1145/3398036
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- Decentralized, Revocable and Verifiable Attribute-Based Encryption in Hybrid Cloud System
- (2019) Ping Yu et al. WIRELESS PERSONAL COMMUNICATIONS
- (Dual) Server-Aided Revocable Attribute-Based Encryption with Decryption Key Exposure Resistance
- (2019) Baodong Qin et al. INFORMATION SCIENCES
- Outsourcing scheme of ABE encryption secure against malicious adversary
- (2019) Go Ohtake et al. COMPUTERS & SECURITY
- Hierarchical attribute based encryption with continuous leakage-resilience
- (2019) Jiguo Li et al. INFORMATION SCIENCES
- Partially policy-hidden attribute-based broadcast encryption with secure delegation in edge computing
- (2019) Hu Xiong et al. Future Generation Computer Systems-The International Journal of eScience
- Secure attribute-based data sharing for resource-limited users in cloud computing
- (2018) Jin Li et al. COMPUTERS & SECURITY
- Ciphertext-policy attribute-based encryption against key-delegation abuse in fog computing
- (2018) Yinhao Jiang et al. Future Generation Computer Systems-The International Journal of eScience
- Auditable $\sigma $ -Time Outsourced Attribute-Based Encryption for Access Control in Cloud Computing
- (2018) Jianting Ning et al. IEEE Transactions on Information Forensics and Security
- Secure Fine-Grained Access Control and Data Sharing for Dynamic Groups in the Cloud
- (2018) Shengmin Xu et al. IEEE Transactions on Information Forensics and Security
- Constant-size ciphertexts in threshold attribute-based encryption without dummy attributes
- (2018) Willy Susilo et al. INFORMATION SCIENCES
- Attribute based encryption in cloud computing: A survey, gap analysis, and future directions
- (2018) Praveen Kumar P et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Large universe attribute based access control with efficient decryption in cloud storage system
- (2018) Xingbing Fu et al. JOURNAL OF SYSTEMS AND SOFTWARE
- Security and Privacy in Smart Health: Efficient Policy-Hiding Attribute-Based Access Control
- (2018) Yinghui Zhang et al. IEEE Internet of Things Journal
- Cloud-Based Fine-Grained Health Information Access Control Framework for LightweightIoT Devices with Dynamic Auditing andAttribute Revocation
- (2018) Lo-Yao Yeh et al. IEEE Transactions on Cloud Computing
- Revocable attribute-based encryption with decryption key exposure resistance and ciphertext delegation
- (2018) Shengmin Xu et al. INFORMATION SCIENCES
- Attribute-based data access control in mobile cloud computing: Taxonomy and open issues
- (2017) Mehdi Sookhak et al. Future Generation Computer Systems-The International Journal of eScience
- CABE: A New Comparable Attribute-Based Encryption Construction with 0-Encoding and 1-Encoding
- (2017) Kaiping Xue et al. IEEE TRANSACTIONS ON COMPUTERS
- Verifiable and Exculpable Outsourced Attribute-Based Encryption for Access Control in Cloud Computing
- (2017) Hui Ma et al. IEEE Transactions on Dependable and Secure Computing
- RAAC: Robust and Auditable Access Control With Multiple Attribute Authorities for Public Cloud Storage
- (2017) Kaiping Xue et al. IEEE Transactions on Information Forensics and Security
- Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing
- (2017) Yinghui Zhang et al. INFORMATION SCIENCES
- Ciphertext-policy attribute-based encryption supporting access policy update and its extension with preserved attributes
- (2017) Yinhao Jiang et al. International Journal of Information Security
- Towards privacy protection and malicious behavior traceability in smart health
- (2017) Yinghui Zhang et al. Personal and Ubiquitous Computing
- Efficient large-universe multi-authority ciphertext-policy attribute-based encryption with white-box traceability
- (2017) Kai Zhang et al. Science China-Information Sciences
- Full Verifiability for Outsourced Decryption in Attribute Based Encryption
- (2017) Jiguo Li et al. IEEE Transactions on Services Computing
- Efficient and privacy-aware attribute-based data sharing in mobile cloud computing
- (2017) Yinghui Zhang et al. Journal of Ambient Intelligence and Humanized Computing
- Attribute-Based Access Control with Constant-Size Ciphertext in Cloud Computing
- (2017) Wei Teng et al. IEEE Transactions on Cloud Computing
- Revocable and Decentralized Attribute-Based Encryption
- (2016) Hui Cui et al. COMPUTER JOURNAL
- Secure, efficient and revocable multi-authority access control system in cloud storage
- (2016) Qi Li et al. COMPUTERS & SECURITY
- Hidden Ciphertext Policy Attribute-Based Encryption Under Standard Assumptions
- (2016) Tran Viet Xuan Phuong et al. IEEE Transactions on Information Forensics and Security
- An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing
- (2016) Shulan Wang et al. IEEE Transactions on Information Forensics and Security
- Anonymous attribute-based proxy re-encryption for access control in cloud computing
- (2016) Yinghui Zhang et al. Security and Communication Networks
- Online/offline unbounded multi-authority attribute-based encryption for data sharing in mobile cloud computing
- (2016) Yinghui Zhang et al. Security and Communication Networks
- Cloud based data sharing with fine-grained proxy re-encryption
- (2016) Yanjiang Yang et al. Pervasive and Mobile Computing
- Efficient attribute-based data sharing in mobile clouds
- (2016) Yinghui Zhang et al. Pervasive and Mobile Computing
- Practical Attribute-Based Encryption: Traitor Tracing, Revocation and Large Universe
- (2015) Zhen Liu et al. COMPUTER JOURNAL
- A secure and efficient Ciphertext-Policy Attribute-Based Proxy Re-Encryption for cloud data sharing
- (2015) Kaitai Liang et al. Future Generation Computer Systems-The International Journal of eScience
- Efficient Privacy-Preserving Ciphertext-Policy Attribute Based-Encryption and Broadcast Encryption
- (2015) Zhibin Zhou et al. IEEE TRANSACTIONS ON COMPUTERS
- Efficient Attribute-Based Comparable Data Access Control
- (2015) Zhijie Wang et al. IEEE TRANSACTIONS ON COMPUTERS
- White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Flexible Attributes
- (2015) Jianting Ning et al. IEEE Transactions on Information Forensics and Security
- Revisiting Attribute-Based Encryption With Verifiable Outsourced Decryption
- (2015) S. Lin et al. IEEE Transactions on Information Forensics and Security
- Attribute-Based Encryption With Efficient Verifiable Outsourced Decryption
- (2015) Baodong Qin et al. IEEE Transactions on Information Forensics and Security
- Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption
- (2015) Taeho Jung et al. IEEE Transactions on Information Forensics and Security
- Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts
- (2014) Hua Deng et al. INFORMATION SCIENCES
- Arbitrary-State Attribute-Based Encryption with Dynamic Membership
- (2013) Chun-I Fan et al. IEEE TRANSACTIONS ON COMPUTERS
- Attribute-Based Encryption With Verifiable Outsourced Decryption
- (2013) Junzuo Lai et al. IEEE Transactions on Information Forensics and Security
- Attribute-Based Secure Data Sharing with Hidden Policies in Smart Grid
- (2013) Junbeom Hur IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS
- Securely Outsourcing Attribute-Based Encryption with Checkability
- (2013) Jin Li et al. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS
- White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Any Monotone Access Structures
- (2012) Zhen Liu et al. IEEE Transactions on Information Forensics and Security
- Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption
- (2012) Ming Li et al. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS
- Time-based proxy re-encryption scheme for secure data sharing in a cloud environment
- (2012) Qin Liu et al. INFORMATION SCIENCES
- Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers
- (2011) Guojun Wang et al. COMPUTERS & SECURITY
- HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing
- (2011) Zhiguo Wan et al. IEEE Transactions on Information Forensics and Security
- Improving Security and Efficiency in Attribute-Based Data Sharing
- (2011) Junbeom Hur IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING
- Attribute-Based Access Control with Efficient Revocation in Data Outsourcing Systems
- (2010) Junbeom Hur et al. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS
- Enhancing Attribute-Based Encryption with Attribute Hierarchy
- (2010) Jin Li et al. MOBILE NETWORKS & APPLICATIONS
Publish scientific posters with Peeref
Peeref publishes scientific posters from all research disciplines. Our Diamond Open Access policy means free access to content and no publication fees for authors.
Learn MoreCreate your own webinar
Interested in hosting your own webinar? Check the schedule and propose your idea to the Peeref Content Team.
Create Now