共 14 条
[1]
A Framework for the Cryptographic Enforcement of Information Flow Policies
[J].
PROCEEDINGS OF THE 22ND ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES (SACMAT'17),
2017,
:143-154
[2]
Iii WCG, 2016, Arxiv, DOI arXiv:1602.09069
[3]
Clear Michael, 2013, Progress in Cryptology - AFRICACRYPT 2013. 6th International Conference on Crytology in Africa. Proceedings, P61, DOI 10.1007/978-3-642-38553-7_4
[4]
Policy Privacy in Cryptographic Access Control
[J].
2015 IEEE 28TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM CSF 2015,
2015,
:46-60
[5]
Cryptographically Enforced RBAC
[J].
2013 IEEE 26TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF),
2013,
:115-129
[6]
Halevi S., 2005, IACR Cryptology ePrint Archive, P169
[7]
Ibraimi Luan., 2011, Cryptographically enforced distributed data access control
[8]
Jahid S., 2011, ASIACCS, P411
[9]
Jie Huang, 2012, 2012 41st International Conference on Parallel Processing Workshops (ICPPW 2012), P279, DOI 10.1109/ICPPW.2012.42
[10]
Universally Composable Cryptographic Role-Based Access Control
[J].
PROVABLE SECURITY, (PROVSEC 2016),
2016, 10005
:61-80