Fine-grained access control of EHRs in cloud using CP-ABE with user revocation
暂无分享,去创建一个
B. Eswara Reddy | L. V. Narasimha Prasad | Gandikota Ramu | Appawala Jayanthi | B. E. Reddy | G. Ramu | Appawala Jayanthi | L. V. N. Prasad
[1] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[2] Jessica Staddon,et al. A content-driven access control system , 2008, IDtrust '08.
[3] Zhenyu Yang,et al. LT codes-based secure and reliable cloud storage service , 2012, 2012 Proceedings IEEE INFOCOM.
[4] Sherman S. M. Chow. Removing Escrow from Identity-Based Encryption , 2009, Public Key Cryptography.
[5] Gandikota Ramu,et al. Secure architecture to manage EHR’s in cloud using SSE and ABE , 2015, Health and Technology.
[6] I. Kohane,et al. Public standards and patients' control: how to keep electronic medical records accessible but private. , 2001, BMJ : British Medical Journal.
[7] Xiang-Yang Li,et al. Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption , 2015, IEEE Trans. Inf. Forensics Secur..
[8] Ling Cheung,et al. Provably secure ciphertext policy ABE , 2007, CCS '07.
[9] Cong Wang,et al. Attribute based data sharing with attribute revocation , 2010, ASIACCS '10.
[10] Hideki Imai,et al. Conjunctive Broadcast and Attribute-Based Encryption , 2009, Pairing.
[11] David Hutchison,et al. A survey of key management for secure group communication , 2003, CSUR.
[12] Brent Waters,et al. Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.
[13] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[14] Xiaohui Liang,et al. Provably secure and efficient bounded ciphertext policy attribute based encryption , 2009, ASIACCS '09.
[15] Rafail Ostrovsky,et al. Attribute-based encryption with non-monotonic access structures , 2007, CCS '07.
[16] Allison Bishop,et al. Revocation Systems with Very Small Private Keys , 2010, 2010 IEEE Symposium on Security and Privacy.
[17] Ming Li,et al. Securing Personal Health Records in Cloud Computing: Patient-Centric and Fine-Grained Data Access Control in Multi-owner Settings , 2010, SecureComm.
[18] Vipul Goyal,et al. Identity-based encryption with efficient revocation , 2008, IACR Cryptol. ePrint Arch..
[19] Amit Sahai,et al. Bounded Ciphertext Policy Attribute Based Encryption , 2008, ICALP.