咨询与建议

限定检索结果

文献类型

  • 9 篇 期刊文献
  • 7 篇 会议

馆藏范围

  • 16 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 16 篇 工学
    • 16 篇 计算机科学与技术...
    • 5 篇 电气工程
    • 3 篇 软件工程
    • 2 篇 信息与通信工程
  • 3 篇 管理学
    • 3 篇 管理科学与工程(可...
  • 2 篇 理学
    • 2 篇 数学

主题

  • 16 篇 access control e...
  • 4 篇 access control
  • 4 篇 receivers
  • 4 篇 encryption
  • 4 篇 cloud computing
  • 2 篇 sanitization
  • 2 篇 data privacy
  • 2 篇 information flow...
  • 2 篇 data sharing
  • 2 篇 decentralized sa...
  • 2 篇 servers
  • 2 篇 security
  • 2 篇 privacy
  • 1 篇 no-write rule
  • 1 篇 decentralized
  • 1 篇 compact cipherte...
  • 1 篇 cloud-edge compu...
  • 1 篇 learning with er...
  • 1 篇 privacy protecti...
  • 1 篇 smart home syste...

机构

  • 3 篇 beijing univ pos...
  • 2 篇 chongqing univ c...
  • 1 篇 chongqing univ k...
  • 1 篇 univ naples part...
  • 1 篇 shanghai jiao to...
  • 1 篇 henan key lab pu...
  • 1 篇 nanyang technol ...
  • 1 篇 sch big data & s...
  • 1 篇 monash univ fac ...
  • 1 篇 chinese univ hon...
  • 1 篇 shanghai jiao to...
  • 1 篇 hangzhou normal ...
  • 1 篇 swiss fed inst t...
  • 1 篇 beijing univ pos...
  • 1 篇 beijing inst tec...
  • 1 篇 guizhou univ col...
  • 1 篇 fujian normal un...
  • 1 篇 kanazawa univ gr...
  • 1 篇 shanghai key lab...
  • 1 篇 univ wollongong ...

作者

  • 3 篇 huang qinlong
  • 2 篇 yao zhongyuan
  • 2 篇 chen lixuan
  • 2 篇 wang chao
  • 2 篇 li xiaoguo
  • 2 篇 xiang tao
  • 1 篇 long yu
  • 1 篇 jiang peng
  • 1 篇 qin jing
  • 1 篇 chow sherman s. ...
  • 1 篇 li qiang
  • 1 篇 chen kefei
  • 1 篇 liang kaitai
  • 1 篇 dang lintao
  • 1 篇 wang wenchao
  • 1 篇 liu qi
  • 1 篇 han jinguang
  • 1 篇 huang xinyi
  • 1 篇 chen liqun
  • 1 篇 chen biwen

语言

  • 16 篇 英文
检索条件"主题词=Access Control Encryption"
16 条 记 录,以下是1-10 订阅
排序:
Cross-Domain Inner-Product access control encryption for Secure EMR Flow in Cloud Edge
收藏 引用
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY 2024年 19卷 9866-9880页
作者: Shi, Caiqun Huang, Qinlong Jian, Rui Chi, Genghui Beijing Univ Posts & Telecommun Sch Cyberspace Secur Beijing 100876 Peoples R China Beijing Univ Posts & Telecommun Natl Engn Res Ctr Disaster Backup & Recovery Beijing 100876 Peoples R China
The quality of medical services is improved by sharing electronic medical records (EMRs) across multiple medical institutions via cloud edge. However, EMRs contain private information about patients, and cloud servers... 详细信息
来源: 评论
access control encryption without sanitizers for Internet of Energy
收藏 引用
INFORMATION SCIENCES 2021年 546卷 924-942页
作者: Wang, Peng Xiang, Tao Li, Xiaoguo Xiang, Hong Chongqing Univ Coll Comp Sci Chongqing 400044 Peoples R China Sch Big Data & Software Engn Chongqing 400044 Peoples R China Chongqing Univ Key Lab Dependable Serv Comp Cyber Phys Soc Minist Educ Chongqing Peoples R China
With the increasing popularity of Internet of Energy (IoE), more and more physical devices connected to IoE depend on the information system for energy control and coordination. Under this condition, how to achieve in... 详细信息
来源: 评论
POSTER: Collaborative Authority-Based Searchable encryption Using access control encryption  21st
POSTER: Collaborative Authority-Based Searchable Encryption ...
收藏 引用
21st International Conference on Applied Cryptography and Network Security (ACNS)
作者: Xu, Dequan Peng, Changgen Tian, Youliang Liu, Hai Wang, Ziyue Wang, Weizheng Guizhou Univ Coll Comp Sci & Technol Key Lab Publ Big Data Guiyang 550025 Peoples R China Kanazawa Univ Grad Sch Nat Sci & Technol Kanazawa Ishikawa 9201192 Japan City Univ Hong Kong Dept Comp Sci Hong Kong Peoples R China
In this poster, we propose a novel searchable encryption (SE) scheme that leverages access control encryption to enhance the security and flexibility of search operations. Our approach requires collaborative authority... 详细信息
来源: 评论
access control encryption from Group encryption  19th
Access Control Encryption from Group Encryption
收藏 引用
19th International Conference on Applied Cryptography and Network Security (ACNS)
作者: Wang, Xiuhua Wong, Harry W. H. Chow, Sherman S. M. Chinese Univ Hong Kong Dept Informat Engn Shatin Hong Kong Peoples R China
access control encryption (ACE) enforces both read and write permissions. It kills off any unpermitted subliminal message channel via the help of a sanitizer who knows neither of the plaintext, its sender and receiver... 详细信息
来源: 评论
Key-aggregate based access control encryption for flexible cloud data sharing
收藏 引用
COMPUTER STANDARDS & INTERFACES 2024年 88卷
作者: Liu, Jinlu Qin, Jing Wang, Wenchao Mei, Lin Wang, Huaxiong Shandong Univ Sch Math Jinan 250100 Shandong Peoples R China Nanjing Univ Sci & Technol Sch Math & Stat Nanjing 210000 Peoples R China Nanyang Technol Univ Sch Phys & Math Sci Singapore 639798 Singapore
Cloud computing has become the priority for users to store and share data due to its numerous tempting advantages. The "encryption-before-outsourcing" mechanism is necessary to protect data privacy against t... 详细信息
来源: 评论
Cross-Domain Attribute-Based access control encryption  20th
Cross-Domain Attribute-Based Access Control Encryption
收藏 引用
20th International Conference on Cryptology and Network Security (CANS)
作者: Sedaghat, Mahdi Preneel, Bart Katholieke Univ Leuven Imec COSIC Leuven Belgium
Logic access control enforces who can read and write data;the enforcement is typically performed by a fully trusted entity. At TCC 2016, Damga'rd et al. proposed access control encryption (ACE) schemes where a pre... 详细信息
来源: 评论
Decentralized access control encryption in Public Blockchain  1st
Decentralized Access Control Encryption in Public Blockchain
收藏 引用
1st International Conference on Blockchain and Trustworthy Systems (BlockSys)
作者: Yao, Zhongyuan Pan, Heng Si, Xueming Zhu, Weihua Henan Key Lab Publ Opin Intelligent Anal Zhengzhou 450001 Henan Peoples R China Zhongyuan Univ Technol Zhengzhou 450001 Henan Peoples R China Fudan Univ Shanghai 200433 Peoples R China
Since its invention, the public blockchain has attracted more attention from both the academia and industry because of its fully decentralization and persistency features. However, the privacy issue in public blockcha... 详细信息
来源: 评论
access control encryption with efficient verifiable sanitized decryption
收藏 引用
INFORMATION SCIENCES 2018年 465卷 72-85页
作者: Wang, Huige Chen, Kefei Liu, Joseph K. Hu, Ziyuan Long, Yu Anhui Sci & Technol Univ Network Engn Dept Chuzhou 233100 Anhui Peoples R China Hangzhou Normal Univ Sch Sci Hangzhou 310036 Zhejiang Peoples R China Shanghai Jiao Tong Univ Dept Comp Sci & Engn Shanghai 200240 Peoples R China Monash Univ Fac Informat Technol Melbourne Vic 3800 Australia Westone Cryptol Res Ctr Beijing 100070 Peoples R China
access control encryption (ACE), as a new cryptographic framework was proposed by Damgard et al. (at TCC 2016), enables controlling both the writing users and the reading users. Recently, a number of access control en... 详细信息
来源: 评论
A Hierarchical access control encryption Scheme Based on Partially Ordered Set  2018
A Hierarchical Access Control Encryption Scheme Based on Par...
收藏 引用
2nd International Conference on Cryptography, Security and Privacy (ICCSP)
作者: Dang, Lintao Li, Qiang Wu, Jun Li, Jianhua Shanghai Jiao Tong Univ Sch Cyber Secur Shanghai 200240 Peoples R China Shanghai Key Lab Integrated Adm Technol Informat Shanghai 200240 Peoples R China
access control encryption (ACE) is a novel cryptographic primitive that controls not only what the users in a system can read, but also what they are allowed to write. Based on the concept of partially ordered set, th... 详细信息
来源: 评论
Strengthening access control encryption  23rd
Strengthening Access Control Encryption
收藏 引用
23rd International Conference on the Theory and Applications of Cryptology and Information Security (ASIACRYPT)
作者: Badertscher, Christian Matt, Christian Maurer, Ueli Swiss Fed Inst Technol Dept Comp Sci CH-8092 Zurich Switzerland
access control encryption (ACE) was proposed by Damg degrees ard et al. to enable the control of information flow between several parties according to a given policy specifying which parties are, or are not, allowed t... 详细信息
来源: 评论