共 28 条
[1]
[Anonymous], 2009, NIST DEFINITION CLOU
[2]
Benaloh Josh., 2009, P 2009 ACM WORKSHOP, P103, DOI DOI 10.1145/1655008.1655024
[3]
Ciphertext-policy attribute-based encryption
[J].
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2007,
:321-+
[4]
Chase M, 2007, LECT NOTES COMPUT SC, V4392, P515
[5]
Chase M, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P121
[7]
Goh E.jin., 2003, PROC NETWORK DISTRIB, P131
[8]
Goyal V., 2006, ACM CCS 2006, P89, DOI DOI 10.1145/1180405.1180418
[9]
Goyal V, 2008, LECT NOTES COMPUT SC, V5126, P579, DOI 10.1007/978-3-540-70583-3_47
[10]
Green Matthew., 2011, USENIX SECURITY S, V2011