共 35 条
[1]
[Anonymous], 1997, Proceedings of the Second ACM Workshop on Role-based Access Control. ACM, New York, NY, USA
[3]
Ciphertext-policy attribute-based encryption
[J].
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2007,
:321-+
[4]
Blakley G. R., 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK), P313, DOI 10.1109/MARK.1979.8817296
[5]
Bobba R, 2009, LECT NOTES COMPUT SC, V5789, P587, DOI 10.1007/978-3-642-04444-1_36
[6]
Boneh D., 2001, Advances in Cryptology - CRTPTO 2001. 21st Annual International Cryptology Conference, Proceedings (Lecture Notes in Computer Science Vol.2139), P213
[7]
Carminati B, 2008, LECT NOTES COMPUT SC, V5094, P81
[9]
Goh E.jin., 2003, PROC NETWORK DISTRIB, P131
[10]
Green Matthew., 2011, USENIX SECURITY S, V2011