Computer Science ›› 2016, Vol. 43 ›› Issue (3): 167-173.doi: 10.11896/j.issn.1002-137X.2016.03.032
Previous Articles Next Articles
HUANG Bao-hua, JIA Feng-wei and WANG Tian-jing
[1] Krutz R L,Vines R D.Cloud security:a comprehensive guide to secure cloud computing[M].Indianapolis,IN:Wiley Publishing,2010:358 [2] Toosi A N,Calheiros R N,Rajkumar B.Interconnected cloud computing environments:challenges,taxonomy,and survey[J].ACM Computing Surveys,2014,47(1):1-47 [3] Zhu Qin,Yu Shou-jian,Le Jia-jin,et al.Research on Security Mechanisms of Outsourced Database[J].Computer Science,2007,34(2):152-156(in Chinese) 朱勤,于守健,乐嘉锦,等.外包数据库系统安全机制研究[J].计算机科学,2007,34(2):152-156 [4] Sahai A,Waters B.Fuzzy Identity-Based encryption [M]∥Advance in Cryptology-EUROCRYPT 2005.Berlin,Germany:Springer-Verlag,2005:557-557 [5] Boneh D,Boyen X.Efficient selective Identity-Based encryption without random oracles[J].J.Cryptology,2011,24(4):659-693 [6] Boneh D,Boyen X.Efficient Selective-ID secure Identity-Based encryption without random oracles[M]∥ Advances in Cryptology-EUROCRYTP 2004.Switzerland:Springer Berlin Heidelberg,2004:223-238 [7] Boneh D,Franklin M.Identity-Based encryption from the weil pairing[J].SIAM Journal on Computing,2003,32(3):586-615 [8] Backes M,Gagn M,Thyagarajan S A K.Fully secure Inner-Product proxy Re-Encryption with constant size ciphertext[C]∥SCC’15.Singapore:ACM,2015:31-40 [9] Goyal V,Pandey O,Amit S,et al.Attribute-Based encryption for fine-grained access control of encrypted data[C]∥13th ACM Conference on Computer and Communications Security.Alexandria,VA,United states:ACM,2006:89-98 [10] Bethencourt J,Amit S,Brent W.Ciphertext-policy attribute-based encryption[C]∥ IEEE Symposium on Security and Privacy,2007(SP ’07).Berkeley,CA,United states,2007:321-334 [11] Cheung L,Newport C.Provably secure ciphertext policy ABE[C]∥14th ACM Conference on Computer and Communications Security.Alexandria,Virginia,USA:ACM,2007:456-465 [12] Khader D.Attribute based search in encrypted data[C]∥2014 ACM Workshop on Information Sharing and Colla.Scottsdale,AZ,United States:ACM,2014:31-40 [13] Chase M,Chow S M.Improving privacy and security in multi-authority attribute-based encryption[C]∥16th ACM Confe-rence on Computer and Communications.Chicago,IL,United States:ACM,2009:121-130 [14] De Caro A,Vincenzo I.Jpbc:Java pairing based cryptography[C]∥2011 IEEE Symposium on Computer and Communications.Kerkyra,Corfu,Greece,2011:850-855 |
No related articles found! |
|