[1] Ruj Sushmita. Attribute based access control in clouds: A survey[C]// SPCOM 2014: Signal Processing and Communications. Bangalore: IEEE, 2014:1-6.
[2] 李晖,孙文海,李凤华,等. 公共云存储服务数据安全及隐私保护技术综述[J]. 计算机研究与发展, 2014,51(7):1397-1409.
[3] Sahai A, Waters B. Fuzzy identity-based encryption[C]// Advances in Cryptology - Eurocrypt 2005. 2005, 3494:457-473.
[4] Goyal V, Pandey O, Sahai A, et al. Attribute-based encryption for fine-grained access control of encrypted data[C]// Proceedings of the 13th ACM Conference on Computer and Communications Security. 2006:89-98
[5] Bethencourt J, Sahai A, Waters B. Ciphertext-policy attribute-based encryption[C]// IEEE Symposium on Security and Privacy. 2007:321-334.
[6] Waters B. Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization[C]// Public Key Cryptography-PKC 2011. 2011:53-70.
[7] Wang Guojun, Liu Qin, Wu Jie. Hierarchical attribute-based encryption for fine-grained access control in cloud storage services[C]// Proceedings of the 17th ACM Conference on Computer and Communications Security. 2010:735-737.
[8] Yu Shucheng, Wang Cong, Ren Kui, et al. Achieving secure, scalable, and fine-grained data access control in cloud computing[C]// INFOCOM 2010: International Conference on Computer Communications. 2010:1-9.
[9] Chase M, Chow S. Improving privacy and security in multi-authority attribute-based encryption[C]// Proceedings of the 16th ACM Conference on Computer and Communications Security. 2009:121-130.
[10]Hur J, Dong K. Attribute-based access control with efficient revocation in data outsourcing systems[J]. IEEE Transactions on Parallel & Distributed Systems, 2011,22(7):1214-1221.
[11]Wang Pengpian, Feng Dengguo, Zhang Liwu. Towards attribute revocation in key-policy attribute based encryption[C]// Cryptology and Network Security. 2011:272-291.
[12]Matthew P, Patrick T, Patrick M, et al. Secure attribute-based systems[C]// Proceedings of ACM Conference on Computer & Communications Security. 2006:99-112.
[13] Yu Shucheng, Wang Cong, Ren Kui, et al. Attribute based data sharing with attribute revocation[C]// Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security. 2010:261-270.
[14]Cheung L, Newport C. Provably secure ciphertext policy ABE[C]// Proceedings of the 2007 ACM Conference on Computer and Communications Security. 2007:456-465.
[15]Canetti R, Halevi S, Katz J. Chosen-Ciphertext security from identity-based encryption[C]// Advances in Cryptology-EUROCRYPT 2004. 2004:207-222.
[16]Nishide T, Yoneyama K, Ohta K. Attribute-Based encryption with partially hidden encryptor-specified access structures[C]// Proceedings of the Applied Cryptography and Network Security. 2008:111-129.
[17]Emura K, Miyaji A, Nomura A, et al. A ciphertext-policy attribute-based encryption scheme with constant ciphertext length[C]// Proceedings of the 5th International Conference on Information Security Practice and Experience (ISPEC 2009). 2009:13-23. |