An Efficient and Fine-Grained Big Data Access Control Scheme With Privacy-Preserving Policy
暂无分享,去创建一个
Zhou Su | Xuemin Shen | Hui Li | Kan Zheng | Qi Han | Kan Yang | Xuemin Shen | Hui Li | Kan Yang | K. Zheng | Z. Su | Qi Han
[1] Robert H. Deng,et al. Fully Secure Cipertext-Policy Hiding CP-ABE , 2011, ISPEC.
[2] P. MuraliKrishna,et al. SECURE SCHEMES FOR SECRET SHARING AND KEY DISTRIBUTION USING PELL'S EQUATION , 2013 .
[3] Jin Li,et al. Privacy-Aware Attribute-Based Encryption with User Accountability , 2009, ISC.
[4] Robert H. Deng,et al. Expressive CP-ABE with partially hidden access structures , 2012, ASIACCS '12.
[5] Zhen Liu,et al. Time-Domain Attribute-Based Access Control for Cloud-Based Video Content Sharing: A Cryptographic Approach , 2016, IEEE Transactions on Multimedia.
[6] Xiaodong Lin,et al. Enabling Fine-grained Access Control with Efficient Attribute Revocation and Policy Updating in Smart Grid , 2015, KSII Trans. Internet Inf. Syst..
[7] HurJunbeom. Attribute-Based Secure Data Sharing with Hidden Policies in Smart Grid , 2013 .
[8] Zhangdui Zhong,et al. Challenges on wireless heterogeneous networks for mobile cloud computing , 2013, IEEE Wireless Communications.
[9] P. Mell,et al. The NIST Definition of Cloud Computing , 2011 .
[10] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization , 2011, Public Key Cryptography.
[11] Brent Waters,et al. Conjunctive, Subset, and Range Queries on Encrypted Data , 2007, TCC.
[12] JiaXiaohua,et al. Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage , 2014 .
[13] Zhou Su,et al. Big data in mobile social networks: a QoE-oriented framework , 2016, IEEE Network.
[14] Mikhail J. Atallah,et al. Attribute-Based Access Control with Hidden Policies and Hidden Credentials , 2006, IEEE Transactions on Computers.
[15] Kazuki Yoneyama,et al. Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures , 2008, ACNS.
[16] Joseph K. Liu,et al. Toward efficient and privacy-preserving computing in big data era , 2014, IEEE Network.
[17] Jonathan Katz,et al. Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products , 2008, Journal of Cryptology.
[18] CaoZhenfu,et al. Secure threshold multi authority attribute based encryption without a central authority , 2008, Inf. Sci..
[19] Wei Xiang,et al. Big data-driven optimization for mobile networks toward 5G , 2016, IEEE Network.
[20] Xiaohua Jia,et al. Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage , 2014, IEEE Transactions on Parallel and Distributed Systems.
[21] Hongwei Li,et al. Engineering searchable encryption of mobile cloud networks: when QoE meets QoP , 2015, IEEE Wireless Communications.
[22] Junbeom Hur,et al. Attribute-Based Secure Data Sharing with Hidden Policies in Smart Grid , 2013, IEEE Transactions on Parallel and Distributed Systems.
[23] Burton H. Bloom,et al. Space/time trade-offs in hash coding with allowable errors , 1970, CACM.
[24] Yi Yang,et al. Enabling Fine-Grained Multi-Keyword Search Supporting Classified Sub-Dictionaries over Encrypted Cloud Data , 2016, IEEE Transactions on Dependable and Secure Computing.
[25] Wenjing Lou,et al. Attribute-based content distribution with hidden policy , 2008, 2008 4th Workshop on Secure Network Protocols.
[26] Xiaohua Jia,et al. Secure and Verifiable Policy Update Outsourcing for Big Data Access Control in the Cloud , 2015 .
[27] Changyu Dong,et al. When private set intersection meets big data: an efficient and scalable protocol , 2013, CCS.