An efficient attribute-based hierarchical data access control scheme in cloud computing
出版年份 2020 全文链接
标题
An efficient attribute-based hierarchical data access control scheme in cloud computing
作者
关键词
-
出版物
Human-centric Computing and Information Sciences
Volume 10, Issue 1, Pages -
出版商
Springer Science and Business Media LLC
发表日期
2020-12-05
DOI
10.1186/s13673-020-00255-5
参考文献
相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。- Secure attribute-based data sharing for resource-limited users in cloud computing
- (2018) Jin Li et al. COMPUTERS & SECURITY
- Compulsory traceable ciphertext-policy attribute-based encryption against privilege abuse in fog computing
- (2018) Huidong Qiao et al. Future Generation Computer Systems-The International Journal of eScience
- User Collusion Avoidance CP-ABE With Efficient Attribute Revocation for Cloud Storage
- (2018) Jiguo Li et al. IEEE Systems Journal
- Efficient attribute-based encryption with attribute revocation for assured data deletion
- (2018) Liang Xue et al. INFORMATION SCIENCES
- Constant-size ciphertexts in threshold attribute-based encryption without dummy attributes
- (2018) Willy Susilo et al. INFORMATION SCIENCES
- Security and Privacy in Smart Health: Efficient Policy-Hiding Attribute-Based Access Control
- (2018) Yinghui Zhang et al. IEEE Internet of Things Journal
- A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing
- (2018) Ruixuan Li et al. IEEE Transactions on Cloud Computing
- A new verifiable outsourced ciphertext-policy attribute based encryption for big data privacy and access control in cloud
- (2018) Praveen Kumar Premkamal et al. Journal of Ambient Intelligence and Humanized Computing
- Accountable CP-ABE with Public Verifiability: How to Effectively Protect the Outsourced Data in Cloud
- (2017) Gang Yu et al. INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE
- Flexible and Fine-Grained Attribute-Based Data Storage in Cloud Computing
- (2017) Jiguo Li et al. IEEE Transactions on Services Computing
- Attribute-Based Access Control with Constant-Size Ciphertext in Cloud Computing
- (2017) Wei Teng et al. IEEE Transactions on Cloud Computing
- An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing
- (2016) Shulan Wang et al. IEEE Transactions on Information Forensics and Security
- Provably secure attribute-based encryption with attribute revocation and grant function using proxy re-encryption and attribute key for updating
- (2015) Takeru Naruse et al. Human-centric Computing and Information Sciences
- Secure, Efficient and Fine-Grained Data Access Control Mechanism for P2P Storage Cloud
- (2014) Heng He et al. IEEE Transactions on Cloud Computing
- Multi-authority attribute-based encryption with honest-but-curious central authority
- (2011) Vladimir Božović et al. INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS
Publish scientific posters with Peeref
Peeref publishes scientific posters from all research disciplines. Our Diamond Open Access policy means free access to content and no publication fees for authors.
Learn MoreAsk a Question. Answer a Question.
Quickly pose questions to the entire community. Debate answers and get clarity on the most important issues facing researchers.
Get Started