Computer Science ›› 2016, Vol. 43 ›› Issue (9): 180-183.doi: 10.11896/j.issn.1002-137X.2016.09.035
Previous Articles Next Articles
ZHOU Peng-xu and LI Cheng-hai
[1] Feng Deng-guo,Zhang Min,Zhang Yan,et al.Studay on Cloud Computing Security[J].Journal of Software,2011,22(1):71-83(in Chinese) 冯登国,张敏,张妍,等.云计算安全研究[J].软件学报,2011,22(1):71-83 [2] Lin Chuang,Su Wen-bo,Meng Kun,et al.Cloud Computing Security:Architecture,Mechanism and Modeling[J].Chinese Journal of Computers,2013,9(36):1765-1784(in Chinese) 林闯,苏文博,孟坤,等.云计算安全:架构、机制与模型评价[J].计算机学报,2013,9(36):1765-1784 [3] Hong Cheng,Zhang Min,Feng Deng-guo.Achieving efficientdynamic cryptographic access control in cloud storage[J].Journal on Communications,2011,32(7):125-132(in Chinese) 洪澄,张敏,冯登国.面向云存储的高效动态密文访问控制方法[J].通信学报,2011,32(7):125-132 [4] Sahai A,Water B.Fuzzy identity-based encryption[C]∥Proc of the 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques.Berlin:Springer-Verlag,2005:457-473 [5] Goyal V,Pandey O,Sahai A,et al.Attribute based encryption for fine-grained access control of encrypted data[C]∥Proc of ACM Conference on Computer and Communications Security.New York:ACM Press,2006:89-98 [6] Bethencount J,Sahai A,Waters B.Ciphertext-policy attribute-based encryption[C]∥Proc of IEEE Symposium on Security and Privacy.IEEE Press,2007:321-334 [7] Wen Yu-hui,Chen Guang-yong,Zhao Jin-tao.Solution of dataaccess control with ciphertext-policy attribute-based encryption in cloud computing[J].Journal of Chongqing University of Posts and Telecommunications(Natural Science Edition),2013,25(5):658-664(in Chinese) 温昱晖,陈广勇,赵劲涛.基于CP-ABE在云计算中实现数据访问控制的方案[J].重庆邮电大学学报(自然科学版),2013,25(5):658-664 [8] Chase M.Multi-Authority attribute based encryption[C]∥Proc of the 4th Theory of Cryptography Conf.Germany:Springer Berlin Heidelberg,2007:515-534 [9] Ruj S,Nayak A,Stojmenovic I.DACC:Distributed access control in clouds[C]∥Proc of the 10th IEEE Int’l Conf.on Trust,Security and Privacy in Computing and Communications.Wa-shington,DC:IEEE Press,2011:91-98 [10] Liu Xue-jiao,Xia Ying-jie,Jiang Sha-sha,et al.Hierarchical attribute-based access control with authentication for outsourced data in cloud computing[C]∥Proc of the 2013 12th IEEE Int’l Conf.on Trust,Security and Privacy in Computing and Communications.Australia:IEEE Press,2013:477-484 [11] Yang Geng,Wang Dong-yang,Zhang Ting,et al.Attribute-Based Access Control with Multi-Authority Structure in Cloud Computing[J].Journal of Nanjing University of Posts and Telecommunications(Natural Science),2014,34(2):2-9(in Chinese) 杨庚,王东阳,张婷,等.云计算环境中基于属性的多权威访问控制方法[J].南京邮电大学学报(自然科学),2014,34(2):2-9 [12] Huang Xiao-fneg,Qi Tao,Qin Bao-dong,et al.Multi-Authority Attribute Based Encryption Scheme Revocation[C]∥2015 24th International Conference on Computer Communication and Networks (ICCCN).IEEE Press,2015:1-5 [13] Chen Yan-li,Song Ling-ling,Yang Geng.Attribute-based access control for multi-authority system with constant size ciphertext in cloud computing[J].Wireless Communication Over Zigbee for Automotive Inclination Measurement China Communications,2016,13(2):146-162 [14] Xu X,Zhou J,Wang X,et al.Multi-Authority proxy re-encryption based on CPABE for cloud storage systems[J].Journal of Systems Engineering and Electronics,2016,27(1):211-223 [15] Chen Dan-wei,Wan Liang-qing,Wang Chen,et al.A Multi-authority Attribute-Based Encryption Scheme with Pre-decryption[C]∥2015 Seventh International Symposium on Parallel Architectures,Algorithms and Programming (PAAP).IEEE Press,2015:223-228 [16] Li Yong,Zeng Zhen-yu,Zhang Xiao-fei.Outsourced decryption scheme supporting attribute revocation[J].Journal of Tsinghua University(Sci & Technol),2013,53(12):1664-1669(in Chinese) 李勇,曾振宇,张晓菲.支持属性撤销的外包解密方案[J].清华大学学报(自然科学版),2013,53(12):1664-1669 [17] Yang Kan,Jia Xiao-hua,Ren Kui,et al.DAC-MACS:Effective data access control for multi-authority cloud storage systems [J].IEEE Transactions on Information Forensics and Security,2013,8(11):1790-1801 [18] Rong Xing,Zhao Yong,Jiang Rong.MMACS:A Multi-Authority Cloud Access Scheme with Mixed Access Structure[C]∥Proc of Workshop on Secure Networking and Forensic Computing.Sydney,NSW:IEEE Press,2014:706-711 |
No related articles found! |
|