共 23 条
- [1] Feng CS, Qin ZG, Ding Y, Yu Q., Key techniques of access control for cloud computing, Acta Electronica Sinica, 43, 2, pp. 312-319, (2015)
- [2] Feng DG, Zhang M, Zhang Y, Xu Z., Study on cloud computing security, Ruan Jian Xue Bao/Journal of Software, 22, 1, pp. 71-83, (2011)
- [3] Feng CS, Qin ZG, Yuan D., Techniques of secure storage for cloud data, Chinese Journal of Computers, 38, 1, pp. 150-163, (2015)
- [4] Sahai A, Waters B., Fuzzy identity based encryption, Proc. of the Advances in Cryptology, Eurocrypt. LNCS, pp. 457-473, (2005)
- [5] Bethencourt J, Sahai A, Waters B., Ciphertext-Policy attribute-based encryption, Proc. of the 2007 IEEE Symp. on Security and Privacy, pp. 321-334, (2007)
- [6] Goyal V, Pandey A, Sahai A, Waters B., Attribute-Based encryption for fine-grained access control of encrypted data, Proc. of the 13th ACM Conf. on Computer and Communications Security (CCS 2006), pp. 89-98, (2006)
- [7] Ostrovsky R, Sahai A, Waters B., Attribute-Based encryption with non-monotonic access structures, Proc. of the 14th ACM Conf. on Computer and Communications Security, pp. 1-17, (2007)
- [8] Cheung L, Newport C., Provably secure ciphertext policy ABE, Proc. of the 14th ACM Conf. on Computer and Communications Security, pp. 456-465, (2007)
- [9] Goyal V, Jain A, Pandey O, Sahai A., Bounded ciphertext policy attribute based encryption, Proc. of the 35th Int'l Colloquium on Automata, Languages and Programming, pp. 579-591, (2008)
- [10] Li J, Ren K, Zhu B, Wan Z., Privacy-Aware attribute-based encryption with user accountability, Proc. of the Int'l Conf. on Information Security, pp. 347-362, (2009)