共 25 条
[1]
Ardagna C.A., 2009, P 1 ACM WORKSH INF S, P49
[2]
Beimel A., 1996, Secure schemes for secret sharing and key distribution
[3]
Bellettini C., 2001, INFORM SECURITY TECH, V2, P21
[4]
Ciphertext-policy attribute-based encryption
[J].
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2007,
:321-+
[5]
Bonatti P. A., 2008, J COMPUTER SECURITY, V10, P241
[6]
Cheung L, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P456
[7]
Goyal V., 2006, P 2006 INT C PRIVACY, P1
[8]
Goyal V, 2008, LECT NOTES COMPUT SC, V5126, P579, DOI 10.1007/978-3-540-70583-3_47
[9]
Key management for content access control in a hierarchy
[J].
COMPUTER NETWORKS,
2007, 51 (11)
:3197-3219