共 19 条
- [1] Subashini S., Kavitha V., A survey on security issues in service delivery models of cloud computing, Journal of Network and Computer Applications, 34, 1, pp. 1-11, (2011)
- [2] Sahai A., Waters B., Fuzzy identity-based encryption, The 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 457-473, (2005)
- [3] Yao L., Yang C., Ma J.F., Et al., New user revocation approach based on intermediate agency for cloud data access control, Journal on Communications, 36, 11, pp. 92-101, (2015)
- [4] Goyal V., Pandey O., Sahai A., Et al., Attribute-based encryption for fine-grained access control of encrypted data, The 13th ACM Conference on Computer and Communications Security, pp. 89-98, (2006)
- [5] Bethencourt J., Sahai A., Waters B., Ciphertext-policy attribute-based encryption, IEEE Symposium on Security and Privacy, pp. 321-334, (2007)
- [6] Sookhak M., Yu F.R., Khan M.K., Et al., Attribute-based data access control in mobile cloud computing: Taxonomy and open issues, Future Generation Computer Systems, 72, C, pp. 273-287, (2017)
- [7] Li Y., Zeng Z.Y., Zhang X.F., Outsourced decryption scheme supporting attribute revocation, Journal of Tsinghua University (Science & Technology), 53, 12, pp. 1664-1669, (2013)
- [8] Pirretti M., Traynor P., Mcdaniel P., Et al., Secure attribute-based systems, The 13th AMC Conference on Computer and Communications Security, pp. 99-112, (2006)
- [9] Rafaeli S., Hutchison D., A survey of key management for secure group communication, ACM Computing Surveys, 35, 3, pp. 309-329, (2003)
- [10] Ibraimi L., Petkovic M., Nikova S., Et al., Mediated ciphertext-policy attribute-based encryption and its application, The 10th International Workshop on Information Security Applications, pp. 309-323, (2009)