共 20 条
- [1] Wang Y.D., Yang J.H., Xu C., Ling X., Yang Y., Survey on access control technologies for cloud computing, Journal of Software, 26, 5, pp. 1129-1150, (2015)
- [2] Feng C., Qin Z., Yuan D., Et al., Key techniques access control for cloud computing, Acta Electronica Sinica, 42, 2, pp. 312-319, (2015)
- [3] Sahai A., Waters B., Fuzzy identity-based encryption, Advances in Cryptology-EUROCRYPT 2005, pp. 457-473, (2005)
- [4] Bethencourt J., Sahai A., Waters B., Ciphertext-Policy attribute-based encryption, Proc of the 2007 IEEE Symp on Security and Privacy, pp. 321-334, (2007)
- [5] Li F.H., Su M., Shi G.Z., Ma J.F., Research status and development trends of access control model, Acta Electronica Sinica, 40, 4, pp. 805-813, (2012)
- [6] Yu N.H., Hao Z., Et al., Review of cloud computing security, Acta Electronica Sinica, 41, 2, pp. 371-381, (2013)
- [7] Goyal V., Jain A., Pandey O., Sahai A., Bounded ciphertext policy attribute based encryption, Proc of the ICALP 2008, pp. 579-591, (2008)
- [8] Liang X.H., Cao Z.F., Lin H., Xing D.S., Provably secure and efficient bounded ciphertext policy attribute based encryption, Proc of the ASIAN ACM Symp. on Information, Computer and Communications Security (ASIACCS 2009), pp. 343-352, (2009)
- [9] Liu X., Ma J., Xiong J., Et al., Ciphertext-policy hierarchical attribute-based encryption for fine-grained access control of encryption Data, International Journal of Network Security, 16, 4, pp. 351-357, (2014)
- [10] Wan Z., Liu J., Deng R.H., HASBE: a hierarchical attribute-based solution for flexible and scalable access control in cloud computing, Information Forensics and Security, IEEE Transactions, 7, 2, pp. 743-754, (2012)