共 15 条
- [1] Li F.H., Yin L.H., Wu W., Et al., Research status and development trends of security assurance for space-ground integration information network, Journal on Communications, 37, 11, pp. 156-168, (2016)
- [2] Jha S., Sural S., Vaidya J., Et al., Security analysis of temporal RBAC under an administrative model, Computers & Security, 46, pp. 154-172, (2014)
- [3] Yang L., Tang Z., Li R.F., Et al., Roles query algorithm in cloud computing environment based on user require, Journal on Communications, 32, 7, pp. 169-175, (2011)
- [4] Luo J., Wang H., Gong X., Et al., A novel role-based access control model in cloud environments, International Journal of Computational Intelligence Systems, 9, 1, pp. 1-9, (2016)
- [5] Li J.W., Squicciarini A., Lin D.J., Et al., SecLoc: securing location-sensitive storage in the cloud, The 20th ACM Symposium on Access Control Models and Technologies, pp. 51-61, (2015)
- [6] Zhou L., Varadharajan V., Hitchens M., Trust enhanced cryptographic role-based access control for secure cloud data storage, IEEE Transactions on Information Forensics and Security, 10, 11, pp. 2381-2395, (2015)
- [7] Zhou L., Varadharajan V., Gopinath K., A secure role-based cloud storage system for encrypted patient-centric health records, Computer Journal, 59, 11, pp. 1593-1611, (2016)
- [8] Xu P., Jiao T., Wu Q., Et al., Conditional identity-based broadcast proxy re-encryption and its application to cloud email, IEEE Transactions on Computers, 65, 1, pp. 66-79, (2015)
- [9] Zhang Y., Li J., Chen X., Et al., Anonymous attribute based proxy re-encryption for access control in cloud computing, Security and Communication Networks, 9, 14, pp. 2397-2411, (2016)
- [10] Li J., Zhao X., Zhang Y., Et al., Provably secure certificate-based conditional proxy re-encryption, Journal of Information Science & Engineering, 32, 4, pp. 813-830, (2016)