共 18 条
- [1] Zhou L, Varadharajan V, Hitchens M., Trust enhanced cryptographic role-based access control for secure cloud data storage, IEEE Trans. on Information Forensics and Security, 10, 11, pp. 2381-2395, (2015)
- [2] Zhu Y, Huang D, Hu CJ, Wang X., From RBAC to ABAC: Constructing flexible data access control for cloud storage services, IEEE Trans. on Services Computing, 8, 4, pp. 601-616, (2015)
- [3] Rezaeibagha FY, Mu Y., Distributed clinical data sharing via dynamic access-control policy transformation, Int’l Journal of Medical Informatics, 89, pp. 25-31, (2016)
- [4] Wang J, Huang CH, Wang JH., An access control mechanism with dynamic privilege for cloud storage, Journal of Computer Research and Development, 53, 4, pp. 904-920, (2016)
- [5] Li J, Yao W, Zhang Y, Qian H, Han J, Flexible and fine-grained attribute-based data storage in cloud computing, IEEE Trans. on Service Computer, 10, 5, pp. 785-796, (2017)
- [6] Li J, Yao W, Han J, Zhang Y, Shen J., User collusion avoidance CP-ABE with efficient attribute revocation for cloud storage, IEEE Systems Journal, 12, 2, pp. 1767-1777, (2017)
- [7] Ye J, Zhang W, Wu S, Gao Y, Qiu J, Attribute-based fine-grained access control with user revocation, Proc. of the ICT-EurAsia, pp. 586-595, (2014)
- [8] Xu P, Jiao T, Wu Q, Wang W, Jin H., Conditional identity-based broadcast proxy re-encryption and its application to cloud email, IEEE Trans. on Computers, 65, 1, pp. 66-79, (2015)
- [9] Zhang Y, Li J, Chen X, Li H., Anonymous attribute based proxy re-encryption for access control in cloud computing, Security and Communication Networks, 9, 14, pp. 2397-2411, (2016)
- [10] Li J, Zhao X, Zhang Y, Yao W., Provably secure certificate-based conditional proxy re-encryption, Journal of Information Science and Engineering, 32, 4, pp. 813-830, (2016)