A3BAC: Attribute-Based Access Control Model with Anonymous Access

[1]  Sraban Kumar Mohanty,et al.  A Scalable Attribute-Based Access Control Scheme with Flexible Delegation cum Sharing of Access Privileges for Cloud Storage , 2020, IEEE Transactions on Cloud Computing.

[2]  Kim-Kwang Raymond Choo,et al.  IoT Forensics: Amazon Echo as a Use Case , 2019, IEEE Internet of Things Journal.

[3]  Shancang Li,et al.  Distributed Consensus Algorithm for Events Detection in Cyber-Physical Systems , 2019, IEEE Internet of Things Journal.

[4]  Shancang Li,et al.  5G Internet of Things: A survey , 2018, J. Ind. Inf. Integr..

[5]  Sylvia L. Osborn,et al.  Current Research and Open Problems in Attribute-Based Access Control , 2017, ACM Comput. Surv..

[6]  Kouichi Sakurai,et al.  A scalable attribute-set-based access control with both sharing and full-fledged delegation of access privileges in cloud computing , 2017, Comput. Electr. Eng..

[7]  Vladimir A. Oleshchuk,et al.  A Patient-Centric Attribute Based Access Control Scheme for Secure Sharing of Personal Health Records Using Cloud Computing , 2016, 2016 IEEE 2nd International Conference on Collaboration and Internet Computing (CIC).

[8]  Nesrine Kaaniche,et al.  Attribute-Based Signatures for Supporting Anonymous Certification , 2016, ESORICS.

[9]  Jin Li,et al.  Anonymous attribute-based proxy re-encryption for access control in cloud computing , 2016, Secur. Commun. Networks.

[10]  Albert Y. Zomaya,et al.  A Survey of Mobile Device Virtualization , 2016, ACM Comput. Surv..

[11]  Tsz Hon Yuen,et al.  k-Times Attribute-Based Anonymous Access Control for Cloud Computing , 2015, IEEE Trans. Computers.

[12]  Laurence T. Yang,et al.  Anonymous Credential-Based Access Control Scheme for Clouds , 2015, IEEE Cloud Computing.

[13]  David F. Ferraiolo,et al.  Guide to Attribute Based Access Control (ABAC) Definition and Considerations , 2014 .

[14]  Manoj Prabhakaran,et al.  Attribute-Based Signatures , 2011, CT-RSA.

[15]  Zhang Lichen Research Progress on Attribute-Based Access Control , 2010 .

[16]  Jan Camenisch,et al.  Anonymous yet accountable access control , 2005, WPES '05.

[17]  Latanya Sweeney,et al.  k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..