共 10 条
[1]
Attribute-based encryptionfor fine-grained access control of encrypted data. GOYAL V,PANDEY O,SAHAI A,et al. Proceedings ofthe 13th ACM Conference on Computer and Communications Secu-rity . 2006
[2]
"Ciphertext-policy attribute-based encryption". John Bethencourt,Amit Sahai,Brent Waters. IEEE Symposium on Security and Privacy . 2007
[3]
"Achieving Secure,Scalable, and Fine-grained Data Access Control in Cloud Computing,". S.Yu,C.Wang,K.Ren,W.Lou. Proceedings IEEE INFOCOM . 2010
[4]
Advanced crypto soft-ware collection:the cpabe toolkit. BETHENCOURT J,SAHAI A,WATERS B. http://acsc.cs.utexas.edu/cpabe/ .
[5]
AES proposal:rijndael,technical report,national institute of standards and technology. DAEMEN J,RIJMEN V. http://csrc.nist.gov/encryption/aes/round2/r2algs.htm .
[6]
An encryption scheme for asecure policy updating. LUAN I,MUHAMMAD A,PETKOVIC. Proceedings of International Conference onSecurity and Cryptography (SECRYPT 2010) . 2010
[7]
Attribute-Based Encryption with Non-Monotonic Access Structures. R Ostrovsky,B Waters. Proceedings of the 14th ACM conference on Computer . 2007
[8]
Combining attribute-based and access systems. Malek B,Miri A. Proc.IEEE CSE 2009,12th IEEEInt’l Conf.on Computational Science and Engineering . 2009
[9]
AB-ACCS:a cryptographic accesscontrol scheme for cloud storage. HONG C,ZHANG M,FENG D G. Journal of Computer ResearchAnd Development . 2010
[10]
Permission manage-ment system:permission as a service in cloud computing. ECHEVERRIA V,LIEBROCK L M,SHIN D. Pro-ceedings of the 1st IEEE International Workshop on Emerging Appli-cations for Cloud Computing . 2010