The Service of Secure Data Publication and Subscription on Cloud Platforms

[1]  Brian Hayes,et al.  What Is Cloud Computing? , 2019, Cloud Technologies.

[2]  Xiaohua Jia,et al.  Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage , 2014, IEEE Transactions on Parallel and Distributed Systems.

[3]  Yiming Zhao,et al.  Efficient Traceable Attribute-Based Signature , 2014, 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications.

[4]  Dawn Xiaodong Song,et al.  Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.

[5]  Brent Waters,et al.  Conjunctive, Subset, and Range Queries on Encrypted Data , 2007, TCC.

[6]  Zhen Liu,et al.  Time-Domain Attribute-Based Access Control for Cloud-Based Video Content Sharing: A Cryptographic Approach , 2016, IEEE Transactions on Multimedia.

[7]  Kenli Li,et al.  A multi-user searchable encryption scheme with keyword authorization in a cloud storage , 2017, Future Gener. Comput. Syst..

[8]  Namje Park,et al.  Attribute Based Proxy Re-encryption for Data Confidentiality in Cloud Computing Environments , 2011, 2011 First ACIS/JNU International Conference on Computers, Networks, Systems and Industrial Engineering.

[9]  Aijun-J. Ge,et al.  Attribute-based Signature Scheme with Constant Size Signature ⋆ , 2012 .

[10]  Xiaohua Jia,et al.  Secure Task Recommendation in Crowdsourcing , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).

[11]  JongWon Kim,et al.  Design of Attribute-Based Access Control in Cloud Computing Environment , 2011, ICITCS.

[12]  Xiaohua Jia,et al.  Improving the proof of “Privacy-preserving attribute-keyword based data publish-subscribe service on cloud platforms” , 2019, PloS one.

[13]  William H. Majoros,et al.  Orion: Detecting regions of the human non-coding genome that are intolerant to variation using population genetics , 2017, PloS one.