共 28 条
[1]
[Anonymous], 2010, NSDI
[2]
Ateniese G., 2006, ACM Transactions on Information and Systems Security, V9, P1, DOI 10.1145/1127345.1127346
[3]
Ciphertext-policy attribute-based encryption
[J].
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2007,
:321-+
[4]
Blaze M, 1998, LECT NOTES COMPUT SC, V1403, P127, DOI 10.1007/BFb0054122
[7]
Chase M, 2007, LECT NOTES COMPUT SC, V4392, P515
[8]
Cloud Security Alliance, 2013, SEC GUID CRIT AR FOC
[9]
DAMIANI E, 2011, INT J ADV SECURITY, V4, P185
[10]
Fei Hu, 2011, Journal of Computing and Information Technology - CIT, V19, P25, DOI 10.2498/cit.1001864