TMO: Time Domain Outsourcing Attribute-Based Encryption Scheme for Data Acquisition in Edge Computing
暂无分享,去创建一个
Congfeng Jiang | Jian Wan | Yuan Wang | Kewei Sha | Youhuizi Li | Zeyong Dong | Y. Wang | Kewei Sha | Congfeng Jiang | Jian Wan | Youhuizi Li | Zeyong Dong
[1] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[2] Nenghai Yu,et al. TAFC: Time and Attribute Factors Combined Access Control for Time-Sensitive Data in Public Cloud , 2020, IEEE Transactions on Services Computing.
[3] K. S. Naidu,et al. Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds , 2017 .
[4] Xuemin Shen,et al. Securing Fog Computing for Internet of Things Applications: Challenges and Solutions , 2018, IEEE Communications Surveys & Tutorials.
[5] Allison Bishop,et al. Decentralizing Attribute-Based Encryption , 2011, IACR Cryptol. ePrint Arch..
[6] Hongwei Liu,et al. An efficient access control scheme with outsourcing capability and attribute update for fog computing , 2018, Future Gener. Comput. Syst..
[7] Jin Li,et al. Defending against Key Abuse Attacks in KP-ABE Enabled Broadcast Systems , 2009, SecureComm.
[8] Zhuo Chen,et al. Edge Analytics in the Internet of Things , 2015, IEEE Pervasive Computing.
[9] Matthew Green,et al. Outsourcing the Decryption of ABE Ciphertexts , 2011, USENIX Security Symposium.
[10] Zhen Liu,et al. Time-Domain Attribute-Based Access Control for Cloud-Based Video Content Sharing: A Cryptographic Approach , 2016, IEEE Transactions on Multimedia.
[11] Sourya Joyee De,et al. Efficient Decentralized Attribute Based Access Control for Mobile Clouds , 2020, IEEE Transactions on Cloud Computing.
[12] Min Ji,et al. CCA-secure ABE with outsourced decryption for fog computing , 2018, Future Gener. Comput. Syst..
[13] Kang Zhang,et al. Applying improved particle swarm optimization for dynamic service composition focusing on quality of service evaluations under hybrid networks , 2018, Int. J. Distributed Sens. Networks.
[14] Hao Wang,et al. Verifiable outsourced ciphertext-policy attribute-based encryption in cloud computing , 2016, Soft Computing.
[15] Albert Y. Zomaya,et al. Composition-Driven IoT Service Provisioning in Distributed Edges , 2018, IEEE Access.
[16] Glenn Rolph,et al. Real-time Environmental Applications and Display sYstem: READY , 2017, Environ. Model. Softw..
[17] Mahadev Satyanarayanan,et al. The Emergence of Edge Computing , 2017, Computer.
[18] Ya Xiao,et al. Secure Data Access Control for Fog Computing Based on Multi-Authority Attribute-Based Signcryption with Computation Outsourcing and Attribute Revocation , 2018, Sensors.
[19] M. Laurent-Maknavicius,et al. PHOABE: Securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted IoT , 2018, Comput. Networks.
[20] Xiaohua Jia,et al. DAC-MACS: Effective Data Access Control for Multiauthority Cloud Storage Systems , 2013, IEEE Transactions on Information Forensics and Security.
[21] Weisong Shi,et al. On security challenges and open issues in Internet of Things , 2018, Future Gener. Comput. Syst..
[22] Weisong Shi,et al. Edge Computing: Vision and Challenges , 2016, IEEE Internet of Things Journal.
[23] Rodrigo Roman,et al. Mobile Edge Computing, Fog et al.: A Survey and Analysis of Security Threats and Challenges , 2016, Future Gener. Comput. Syst..
[24] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization , 2011, Public Key Cryptography.
[25] Melissa Chase,et al. Multi-authority Attribute Based Encryption , 2007, TCC.
[26] G. Manoj Someswar,et al. Time-Based Proxy Re-encryption Scheme for Secure Data Sharing in a Cloud Environment , 2015 .
[27] Brent Waters,et al. Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.
[28] Xiaohua Jia,et al. Enabling efficient access control with dynamic policy updating for big data in the cloud , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.
[29] Yucong Duan,et al. Toward service selection for workflow reconfiguration: An interface-based computing solution , 2018, Future Gener. Comput. Syst..
[30] Yucong Duan,et al. An Approach to Data Consistency Checking for the Dynamic Replacement of Service Process , 2017, IEEE Access.
[31] Cheng Zhang,et al. A Density-Based Offloading Strategy for IoT Devices in Edge Computing Systems , 2018, IEEE Access.
[32] Robert H. Deng,et al. Fully secure key-policy attribute-based encryption with constant-size ciphertexts and fast decryption , 2014, AsiaCCS.
[33] Jin Li,et al. Secure attribute-based data sharing for resource-limited users in cloud computing , 2018, Comput. Secur..
[34] Hui Ma,et al. Verifiable and Exculpable Outsourced Attribute-Based Encryption for Access Control in Cloud Computing , 2017, IEEE Transactions on Dependable and Secure Computing.
[35] Brent Waters,et al. Efficient Statically-Secure Large-Universe Multi-Authority Attribute-Based Encryption , 2015, Financial Cryptography.