Privacy-preserving access control model for big data cloud
暂无分享,去创建一个
[1] JiaXiaohua,et al. Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage , 2014 .
[2] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[3] Jonathan Katz,et al. Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products , 2008, Journal of Cryptology.
[4] Cong Wang,et al. Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.
[5] Sushil Jajodia,et al. Encryption policies for regulating access to outsourced data , 2010, TODS.
[6] Somchart Fugkeaw,et al. Achieving privacy and security in multi-owner data outsourcing , 2012, Seventh International Conference on Digital Information Management (ICDIM 2012).
[7] Robert H. Deng,et al. HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing , 2012, IEEE Transactions on Information Forensics and Security.
[8] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[9] Hiroyuki Sato,et al. An Extended CP-ABE Based Access Control Model for Data Outsourced in the Cloud , 2015, 2015 IEEE 39th Annual Computer Software and Applications Conference.
[10] Yao Zheng,et al. Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption , 2019, IEEE Transactions on Parallel and Distributed Systems.
[11] Xiaohua Jia,et al. Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage , 2014, IEEE Transactions on Parallel and Distributed Systems.
[12] Vijay Varadharajan,et al. Enforcing Role-Based Access Control for Secure Data Storage in the Cloud , 2011, Comput. J..
[13] Brent Waters,et al. Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.
[14] Vijay Varadharajan,et al. Achieving Secure Role-Based Access Control on Encrypted Data in Cloud Storage , 2013, IEEE Transactions on Information Forensics and Security.
[15] Bo Luo,et al. Access control for big data using data content , 2013, 2013 IEEE International Conference on Big Data.