共 25 条
[1]
Ciphertext-policy attribute-based encryption
[J].
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2007,
:321-+
[2]
[陈丹伟 Chen Danwei], 2014, [电子学报, Acta Electronica Sinica], V42, P821
[3]
Chen DW, 2009, LECT NOTES COMPUT SC, V5931, P559, DOI 10.1007/978-3-642-10665-1_52
[5]
Ene A, 2008, SACMAT'08: PROCEEDINGS OF THE 13TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, P1
[6]
dRBAC: Distributed role-based access control for dynamic coalition environments
[J].
22ND INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS,
2002,
:411-420
[7]
On the Practicality of Cryptographically Enforcing Dynamic Access Control Policies in the Cloud
[J].
2016 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP),
2016,
:819-838
[8]
Goyal V., 2006, P 13 ACM C COMP COMM, P89, DOI 10.1145/1180405.1180418
[9]
Goyal V, 2008, LECT NOTES COMPUT SC, V5126, P579, DOI 10.1007/978-3-540-70583-3_47
[10]
Application-Sensitive Access Control Evaluation using Parameterized Expressiveness
[J].
2013 IEEE 26TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF),
2013,
:145-160