共 55 条
- [21] Controlling Data in the Cloud:Outsourcing,Computation Without Outsourcing Control. CHOW R,GOLLE P,JAKOBSSON M,et al. Proceedings of ACM Cloud Computing Security Workshop . 2009
- [22] Achieving secure, scalable, and fine-grained data access control in cloud computing. Yu S,Wang C,Ren K, et al. INFOCOM’’10 . 2010
- [23] Attribute-based Fine-Grained Access Control with Efficient Revocation in Cloud Storage Systems. Yang Kan,Jia Xiao-hua,et al. Proc of ASIA CCS . 2013
- [24] Attribute-based encryption with non-monotonic access structures. OSTROVSKY R,SAHAI A,WATERS B. The ACM Conf on Computer and Communications Security . 2007
- [26] Fully securefunctional encryption:Attribute-based encryption and(hierarchical)inner product encryption. Lewko A,Okamoto T,Sahai A,et al. LectureNotes in Computer Science . 2010
- [27] A ciphertext-policy attribute-based encryption scheme with constant ciphertext length. Emura K,Miyaji A,Nomura A,et al. Lecture Notes in Computer Science . 2009
- [28] Efficient Ciphertext Policy Attribute-Based Encryption with Constant-SizeCiphertext and Constant Computation-Cost. Chen C,Zhang Z,Feng D. Lecture Notes in Computer Science . 2011
- [29] Chosen-ciphertext security from identity-based encryption. CANETTI R,HALEVI S,KATZ J. Lecture Notes in Computer Science . 2004
- [30] Secure attribute-based systems. PIRRETTI M,TRAYNOR P,MCDANIEL P,et al. The ACM Conf on Computer and Communications Security . 2006