Computer Science ›› 2016, Vol. 43 ›› Issue (5): 122-126.doi: 10.11896/j.issn.1002-137X.2016.05.023
Previous Articles Next Articles
XIE Li-xia, BO Fu-kuan and ZHAO Bin-bin
[1] Wu J,Fu J,Lin Z,et al.A survey on cloud storage [J].Journal of Computers,2011,6(8):1764-1771 [2] Elavarasi P,Parijatham R.Key updation for the dynamic attri-butes in cloud computing for competent user retraction [J].International Journal of Engineering Science and Technology,2013,5(06s):2278-9510 [3] Sahai A,Waters B.Fuzzy identity-based encryption[C]∥The 24th Annual International Conference on Theory and Applications of Cryptographic Techniques.Berlin:Springer,2005:457-473 [4] Goyal B,Pandey O,Sahai A,et al.Attribute based encryption for fine-grained access control of encrypted data[C]∥The 13th ACM Conference on Computer and Communications Security.New York:ACM Press,2006:89-98 [5] Bethencourt J,Sahai A,Waters B.Ciphertext-policy attribute-based encryption[J].Journal of Network and Computer Applications,2010,33(2):76-83 [6] Waters B.Ciphertext-policy attribute-based encryption:An expressive,efficient,and provably secure realization[C]∥The 14th International Conference on Practice and Theory in Public Key Cryptography.Berlin:Springer,2011,6571:53-70 [7] Zhang R,Chen P.A Dynamic Cryptographic Access Control Sch-eme in Cloud Storage Services [C]∥2012 8th International Conference on Computing and Networking Technology.Washington D C:IEEE CS Press,2012:50-55 [8] Pervez Z,Khattak A M,Lee S,et al.SAPDS:self-healing attri-bute-based privacy aware data sharing in cloud[J].The Journal of Supercomputing,2012,62(1):431-460 [9] Yang K,Jia X,Ren K.Attribute-based Fine-Grained AccessControl with Efficient Revocation in Cloud Storage Systems[C]∥The 8th ACM Symposium on Information,Computer and Communications Security.New York:ACM Press,2013:523-528 [10] Yu S,Wang S,Ren K,et al.Attribute based data sharing with attribute revocation[C]∥The 5th ACM Symposium on Information,Computer and Communications Security.New York:ACM Press,2010:261-270 [11] Su J S,Cao D,Wang X F,et al.Attribute-based encryption sch-emes[J].Journal of Software,2011,22(6):1299-1315(in Chinese) 苏金树,曹丹,王小峰,等.属性基加密机制[J].软件学报,2011,2(6):1299-1315 [12] GAS lab.Java Pairing Based Cryptography Library[EB/OL].(2013-12-01).http://gas.dia.unisa.it/projects/jpbc/contact.html |
No related articles found! |
|