共 49 条
[1]
Akinyele JosephA., 2011, P 1 ACM WORKSHOP SEC, P75, DOI DOI 10.1145/2046614.2046628
[2]
CRYPTOGRAPHIC SOLUTION TO A PROBLEM OF ACCESS-CONTROL IN A HIERARCHY
[J].
ACM TRANSACTIONS ON COMPUTER SYSTEMS,
1983, 1 (03)
:239-248
[3]
Tree-Based Cryptographic Access Control
[J].
COMPUTER SECURITY - ESORICS 2017, PT I,
2018, 10492
:47-64
[5]
Badve OP, 2015, 2015 IEEE 4TH GLOBAL CONFERENCE ON CONSUMER ELECTRONICS (GCCE), P584, DOI 10.1109/GCCE.2015.7398603
[6]
Ball M., 2006, J HEALTHCARE INFORM, V21, P76
[7]
Ciphertext-policy attribute-based encryption
[J].
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2007,
:321-+