共 16 条
- [1] Bonomi F, Milito R, Jiang Zhu, Et al., Fog computing and its role in the internet of things, Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing, pp. 13-16, (2012)
- [2] Bethencourt J, Sahai A, Waters B., Ciphertext -policy attribute-based encryption, 2007 IEEE Symposium on Security and Privacy(SP'07), pp. 321-334, (2007)
- [3] Ostrovsky R, Sahai A, Waters B., Attribute-based encryption with non-monotonic access structures, Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 195-203, (2007)
- [4] Li Yang, Zhu Jianming, Wang Xiuli, Et al., Optimized ciphertext- policy attribute-based encryption with efficient revocation, International Journal of Security & Its Applications, 7, 6, pp. 385-394, (2013)
- [5] Chen Hongsong, Shen Qianglei, A new type of attribute-based encryption scheme supporting efficient revocation in cloud computing environment, Journal of Beijing University of Posts and Telecommunications, 41, 3, pp. 113-118, (2018)
- [6] Zhao Zhiyuan, Zhu Zhiqiang, Wang Jianhua, Et al., Research on keyless escrow and revocable attribute-based encryption scheme in cloud storage environment, Journal of Electronics and Information, 40, 1, pp. 1-10, (2018)
- [7] Attrapadung N, Imai H., Conjunctive broadcast and attribute-based encryption, International Conference on Pairing-Based Cryptography, pp. 248-265, (2009)
- [8] Liu Zhen, Wong Duncan S., Practical attribute-based encryption: traitor tracing, revocation and large universe, The Computer Journal, 59, 7, pp. 983-1004, (2016)
- [9] Debnath S, Bhuyan B., Large universe attribute based encryption enabled secured data access control for cloud storage with computation outsourcing, Multiagent and Grid Systems, 15, 2, pp. 99-119, (2019)
- [10] Dhal K, Pattnaik P K, Rai S C., RACC: An efficient and revocable fine grained access control model for cloud storage, International Journal of Knowledge-Based and Intelligent Engineering Systems, 23, 1, pp. 21-32, (2019)