Attribute-Based Information Flow Control
暂无分享,去创建一个
Fuchun Guo | Jinguang Han | Yang Xiang | Jie Cao | Liqun Chen | Maoxuan Bei | Weizhi Meng
[1] Dorothy E. Denning,et al. A lattice model of secure information flow , 1976, CACM.
[2] Jiguo Li,et al. Searchable ciphertext‐policy attribute‐based encryption with revocation in cloud storage , 2017, Int. J. Commun. Syst..
[3] Yao Zheng,et al. Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption , 2019, IEEE Transactions on Parallel and Distributed Systems.
[4] Jin Li,et al. Securely Outsourcing Attribute-Based Encryption with Checkability , 2014, IEEE Transactions on Parallel and Distributed Systems.
[5] Jian Shen,et al. Expressive attribute-based keyword search with constant-size ciphertext , 2017, Soft Computing.
[6] Robert H. Deng,et al. Revocable and Decentralized Attribute-Based Encryption , 2016, Comput. J..
[7] F. Richard Yu,et al. Securing Outsourced Data in the Multi-Authority Cloud with Fine-Grained Access Control and Efficient Attribute Revocation , 2017, Comput. J..
[8] Qixiang Mei,et al. Generic and Efficient Constructions of Attribute-Based Encryption with Verifiable Outsourced Decryption , 2016, IEEE Transactions on Dependable and Secure Computing.
[9] Peter J. Denning,et al. Certification of programs for secure information flow , 1977, CACM.
[10] Dan Boneh,et al. Short Signatures Without Random Oracles and the SDH Assumption in Bilinear Groups , 2008, Journal of Cryptology.
[11] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.
[12] Jiguo Li,et al. KSF-OABE: Outsourced Attribute-Based Encryption with Keyword Search Function for Cloud Storage , 2017, IEEE Transactions on Services Computing.
[13] Weixin Xie,et al. Attribute-Based Data Sharing Scheme Revisited in Cloud Computing , 2016, IEEE Transactions on Information Forensics and Security.
[14] Xiaolei Dong,et al. Auditable $\sigma $ -Time Outsourced Attribute-Based Encryption for Access Control in Cloud Computing , 2018, IEEE Transactions on Information Forensics and Security.
[15] Robert H. Deng,et al. Attribute-Based Encryption With Verifiable Outsourced Decryption , 2013, IEEE Transactions on Information Forensics and Security.
[16] David M. Eyers,et al. Information Flow Control for Secure Cloud Computing , 2014, IEEE Transactions on Network and Service Management.
[17] Dijiang Huang,et al. Efficient Attribute-Based Comparable Data Access Control , 2015, IEEE Transactions on Computers.
[18] Claus-Peter Schnorr,et al. Efficient signature generation by smart cards , 2004, Journal of Cryptology.
[19] Yi Mu,et al. Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption , 2012, IEEE Trans. Parallel Distributed Syst..
[20] Tooska Dargahi,et al. On the Feasibility of Attribute-Based Encryption on Internet of Things Devices , 2016, IEEE Micro.
[21] Yi Mu,et al. Improving Privacy and Security in Decentralized Ciphertext-Policy Attribute-Based Encryption , 2015, IEEE Transactions on Information Forensics and Security.
[22] Zhi Chen,et al. A lightweight attribute-based encryption scheme for the Internet of Things , 2015, Future Gener. Comput. Syst..
[23] Guido Marchetto,et al. Push applications and dynamic content generation over content‐centric networking , 2017, Int. J. Commun. Syst..