共 26 条
- [1] Feng D., Zhang M., Zhang Y., Et al., Study on cloud computing security, Journal of Software, 22, 1, pp. 71-83, (2011)
- [2] Park J., Sandhu R.S., Towards usage control models: Beyond traditional access control, Proc of the 7th ACM Symp on Access Control Models and Technologies, pp. 52-61, (2002)
- [3] Sahai A., Waters B., Fuzzy identity-based encryption, Proc of Annual Int Conf on the Theory and Applications of Cryptographic Techniques, pp. 57-64, (2005)
- [4] Green M., Hohenberger S., Waters S., Outsourcing the decryption of ABE ciphertexts, Proc of the 20th USENIX Conf on Security, (2011)
- [5] Zhou Z., Huang D., Efficient and secure data storage operations for mobile cloud computing, Proc of the 8th Int Conf on Network and Service Management, pp. 37-45, (2012)
- [6] Li J., Huang X., Li J., Et al., Securely outsourcing attribute-based encryption with checkability, IEEE Transactions on Parallel and Distributed Systems, 8, 25, pp. 2201-2210, (2014)
- [7] Goyal V., Pandey O., Sahai A., Et al., Attribute-based encryption for fine-grained access control of encrypted data, Proc of the 13th ACM Conf on Computer and Communications Security, pp. 89-98, (2006)
- [8] Bethencourt J., Sahai A., Waters B., Ciphertext-policy attribute-based encryption, Proc of the 28th IEEE Symp on Security and Privacy, pp. 321-324, (2007)
- [9] Yu S., Wang C., Ren K., Et al., Attribute based data sharing with attribute revocation, Proc of the 5th ACM Symp on Information, Computer and Communications Security (ASIACCS'10), pp. 261-270, (2010)
- [10] Hohenberger S., Waters B., Online/offline attribute-based encryption, Proc of PublicKey Cryptography (PKC 2014), pp. 293-310, (2014)