共 19 条
[1]
Li R.X., Dong X.H., Gu X.W., Et al., Overview of the data security and privacy preserving of mobile cloud services, Journal on Communications, 34, 12, pp. 159-166, (2013)
[2]
Feng D.G., Zhang M., Zhang Y., Et al., Study on cloud computing security, Journal of Software, 22, 1, pp. 71-83, (2011)
[3]
Shamir A., Identity-based cryptosystems and signature schemes, Advances in Cryptology, pp. 47-53, (1985)
[4]
Sahai A., Waters B., Fuzzy identity-based encryption, Advances in Cryptology-EUROCRYPT 2005, pp. 557-557, (2005)
[5]
Goyal V., Pandey O., Sahai A., Et al., Attribute-based encryption for fine grained access control of encrypted data, CCS, pp. 89-98, (2006)
[6]
Su J.S., Cao D., Wang X.F., Et al., Attribute-based encryption schemes, Journal of Software, 22, 6, pp. 1299-1315, (2011)
[7]
Yu S., Wang C., Ren K., Lou W., Achieving secure, scalable, and fine-grained data access control in cloud computing, IEEE INFOCOM, pp. 1-9, (2010)
[8]
Yu N.H., Hao Z., Xu J.J., Et al., Review of cloud computing security, Acta Electronica Sinica, 41, 2, pp. 371-381, (2013)
[9]
Bethencourt J., Sahai A., Waters B., Ciphertext-policy attribute-based encryption, IEEE S&P, pp. 321-334, (2007)
[10]
Wang G.J., Liu Q., Wu J., Hierarchical attribute-based encryption for fine-grained access control in cloud storage services, CCS, pp. 735-737, (2010)