Computer Science ›› 2024, Vol. 51 ›› Issue (10): 372-379.doi: 10.11896/jsjkx.230700094
• Information Security • Previous Articles Next Articles
MEN Ruirui, JIA Hongyong, DU Jinru
CLC Number:
[1]MACIEL L,BALLINI R,GOMIDE F.Adaptive fuzzy modeling of interval-valued stream data and application in cryptocurrencies prediction[J].Neural Computing and Applications,2023,35(10):7149-7159. [2]SRIRAMG S.Edge computing vs.Cloud computing:an overview of big data challenges and opportunities for large enterprises[J].International Research Journal of Modernization in Engineering Technology and Science,2022,4(1):1331-1337. [3]ZHANG T,SHEN J,LAI C F,et al.Multi-server assisted data sharing supporting secure deduplication for metaverse healthcare systems[J].Future Generation Computer Systems,2023,140:299-310. [4]RASORI M,PERAZZO P,DINI G,et al.Indirect revocable kp-abe with revocation undoing resistance[J].IEEE Transactions on Services Computing,2021,15(5):2854-2868. [5]DAS S,NAMASUDRA S.Multiauthority CP-ABE-based Ac-cess Control Model for IoT-enabled Healthcare Infrastructure[J].IEEE Transactions on Industrial Informatics,2022,19(1):821-829. [6]WANG W,HUANG H,YIN Z,et al.Smart contract token-based privacy-preserving access control system for industrial Internet of Things[J].Digital Communications and Networks,2023,9(2):337-346. [7]SAIDI H,LABRAOUI N,ARI A A A,et al.DSMAC:Privacy-aware Decentralized Self-Management of data Access Control based on blockchain for health data[J].IEEE Access,2022,10:101011-101028. [8]BURKHALTER L,HITHNAWI A,VIAND A,et al.Time-Crypt:Encrypted Data Stream Processing at Scale with Cryptographic Access Control [C]//17th USENIX Symposium on Networked Systems Design and Implementation.2020:1053-1062. [9]CHOKSY P,CHAURASIA A,RAO U P,et al.Attribute based access control(ABAC) scheme with a fully flexible delegation mechanism for IoT healthcare[J].Peer-to-Peer Networking and Applications,2023,16(1):1445-1467. [10]TAO J,CHEN X,MA J.Public Integrity Auditing for SharedDynamic Cloud Data with Group User Revocation[J].IEEE Transactions on Computers,2016,65(8):2363-2373. [11]WU L,WANG J,ZEADALLY S,et al.Privacy-preserving auditing scheme for shared data in public clouds[J].The Journal of Supercomputing,2018,74(11):6156-6183. [12]HÖGLUND J,FURUHED M,RAZA S.Lightweight certificate revocation for low-power IoT with end-to-end security[J].Journal of Information Security and Applications,2023,73:103424. [13]SHAFAGH H,BURKHALTER L,RATNASAMY S,et al.Droplet:Decentralized Authorization and Access Control for Encrypted Data Streams[C]//USENIX Security Symposium.USENIX Association.2020:2469-2486. [14]YANG Y,SHI R,LI K,et al.Multiple access control scheme for EHRs combining edge computing with smart contracts[J].Future Generation Computer Systems,2022,129:453-463. [15]ZHANG R,LI J,LU Y,et al.Key escrow-free attribute based encryption with user revocation[J].Information Sciences,2022,600:59-72. [16]YU K,TAN L,ALOQAILY M,et al.Blockchain-enhanced data sharing with traceable and direct revocation in IIoT[J].IEEE transactions on industrial informatics,2021,17(11):7669-7678. [17]WIRAATMAJA C,ZHANG Y,SASABE M,et al.Cost-efficient blockchain-based access control for the internet of things[C]//2021IEEE Global Communications Conference.IEEE,2021:1-6. [18]LI D,HAN D,CRESPI N,et al.A blockchain-based secure sto-rage and access control scheme for supply chain finance[J].The Journal of Supercomputing,2023,79(1):109-138. [19]LIU J,LIU Z,SUN C,et al.A data transmission approach basedon ant colony optimization and threshold proxy re-encryption in wsns[J].Journal of Artificial Intelligence and Technology,2022,2(1):23-31. [20]LIN S Y,ZHANG L,LI J,et al.A survey of application research based on blockchain smart contract[J].Wireless Networks,2022,28(2):635-690. [21]SHI J F,WU H,GAO H R,et al.Overview of parallel execution models for blockchain smart contract transactions [J].Journal of Software,2022,33(11):4084-4106. [22]AGRAWAL T K,ANGELIS J,KHILJI W A,et al.Demonstration of a blockchain-based framework using smart contracts for supply chain collaboration[J].International Journal of Production Research,2023,61(5):1497-1516. [23]YIN Y Y,YE B Y,LIANG T T,et al.Research on multi-layer blockchain network model in edge computing scenario [J].Journal of Computer Science,2022,45(1):115-134. [24]CHEN D,WANG H,ZHANG N,et al.Privacy-preserving encrypted traffic inspection with symmetric cryptographic techniques in IoT[J].IEEE Internet of Things Journal,2022,9(18):17265-17279. [25]CASACUBERTA S,HESSE J,LEHMANN A.SoK:Oblivious Pseudorandom Functions[C]//2022 IEEE 7th European Symposium on Security and Privacy(EuroS&P).IEEE,2022:625-646. |
[1] | ZHOU Wenhui, PENG Qinghua, XIE Lei. Study on Adaptive Cloud-Edge Collaborative Scheduling Methods for Multi-object State Perception [J]. Computer Science, 2024, 51(9): 319-330. |
[2] | WANG Dong, LI Xiaoruo, ZHU Bingnan. Transaction Granularity Modifiable Consortium Blockchain Scheme Based on Dual Merkel Trees Block Structure [J]. Computer Science, 2024, 51(9): 408-415. |
[3] | REN Jiadong, LI Shangyang, REN Rong, ZHANG Bing, WANG Qian. Web Access Control Vulnerability Detection Approach Based on Site Maps [J]. Computer Science, 2024, 51(9): 416-424. |
[4] | ZANG Wenyang, LYU Jinlai. Study on Time Rotation Notary Group Model Based on Threshold Signature [J]. Computer Science, 2024, 51(8): 403-411. |
[5] | XIANG Yanjie, HUANG Xiaofang, XIANG Kefeng, ZHENG Ji’nan. Blockchain Certificateless Encryption Mechanism Based on National Secret Algorithm [J]. Computer Science, 2024, 51(8): 440-446. |
[6] | SUN Li. Application,Challenge and New Strategy of Block Chain Technology in Metaverse [J]. Computer Science, 2024, 51(7): 373-379. |
[7] | LI Zhiyuan, XU Binglei, ZHOU Yingyi. Blockchain Anonymous Transaction Tracking Method Based on Node Influence [J]. Computer Science, 2024, 51(7): 422-429. |
[8] | LIU Dong, WANG Ruijin, ZHAO Yanjun, MA Chaoyang, YUAN Haonan. Study on Key Platform of Edge Computing Server Based on ARM Architecture [J]. Computer Science, 2024, 51(6A): 230600119-8. |
[9] | WANG Zhongxiao, PENG Qinglan, SUN Ruoxiao, XU Xifeng, ZHENG Wanbo, XIA Yunni. Delay and Energy-aware Task Offloading Approach for Orbit Edge Computing [J]. Computer Science, 2024, 51(6A): 240100188-9. |
[10] | LIANG Jingyu, MA Bowen, HUANG Jiwei. Reliability-aware VNF Instance Placement in Edge Computing [J]. Computer Science, 2024, 51(6A): 230500064-6. |
[11] | ZHU Jun, ZHANG Guoyin, WAN Jingjing. Study on Data Security Framework Based on Identity and Blockchain Integration [J]. Computer Science, 2024, 51(6A): 230400056-5. |
[12] | LAN Yajie, MA Ziqiang, CHEN Jiali, MIAO Li, XU Xin. Survey on Application of Searchable Attribute-based Encryption Technology Based on Blockchain [J]. Computer Science, 2024, 51(6A): 230800016-14. |
[13] | SUN Jianming, ZHAO Mengxin. Survey of Application of Differential Privacy in Edge Computing [J]. Computer Science, 2024, 51(6A): 230700089-9. |
[14] | XUE Jianbin, DOU Jun, WANG Tao, MA Yuling. Scheme for Maximizing Secure Communication Capacity in UAV-assisted Edge Computing Networks [J]. Computer Science, 2024, 51(6A): 230800032-7. |
[15] | TAN Jingqi, XUE Lingyan, HUANG Haiping, CHEN Long, LI Yixuan. Data Security Management Scheme Based on Editable Medical Consortium Chain [J]. Computer Science, 2024, 51(6A): 240400056-8. |
|