咨询与建议

限定检索结果

文献类型

  • 8 篇 期刊文献
  • 3 篇 会议

馆藏范围

  • 11 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 11 篇 工学
    • 8 篇 计算机科学与技术...
    • 5 篇 信息与通信工程
    • 2 篇 电气工程
    • 1 篇 电子科学与技术(可...
  • 1 篇 理学
    • 1 篇 化学

主题

  • 11 篇 ciphertext polic...
  • 4 篇 access control
  • 2 篇 revocation
  • 2 篇 cloud access con...
  • 1 篇 standard model
  • 1 篇 permanent revoca...
  • 1 篇 bilinear mapping
  • 1 篇 data provenance
  • 1 篇 secure file dist...
  • 1 篇 public encryptio...
  • 1 篇 advanced encrypt...
  • 1 篇 location privacy
  • 1 篇 pairing based cr...
  • 1 篇 bloom filter
  • 1 篇 deduplication
  • 1 篇 time and locatio...
  • 1 篇 revocable
  • 1 篇 iot
  • 1 篇 core and reduct ...
  • 1 篇 decentralized ke...

机构

  • 2 篇 univ manouba tun...
  • 1 篇 univ manouba ens...
  • 1 篇 chinese acad sci...
  • 1 篇 kyungpook natl u...
  • 1 篇 xihua univ sch m...
  • 1 篇 vit univ sch inf...
  • 1 篇 sami shamoon col...
  • 1 篇 qingdao univ col...
  • 1 篇 ben gurion univ ...
  • 1 篇 indonesian inst ...
  • 1 篇 ben gurion univ ...
  • 1 篇 indian inst tech...
  • 1 篇 xidian univ stat...
  • 1 篇 univ elect sci &...
  • 1 篇 shaanxi univ sci...
  • 1 篇 islamic univ mad...
  • 1 篇 kyungpook natl u...

作者

  • 3 篇 bouchaala mariem
  • 3 篇 ghazel cherif
  • 2 篇 saidane leila az...
  • 1 篇 fu xingbing
  • 1 篇 wang liming
  • 1 篇 alzahrani ali m.
  • 1 篇 zeng shengke
  • 1 篇 cai xiaohua
  • 1 篇 gilboa niv
  • 1 篇 zhang shuguang
  • 1 篇 siddiqui muhamma...
  • 1 篇 nadeem adnan
  • 1 篇 dolev shlomi
  • 1 篇 moon sangjae
  • 1 篇 saidane leila az...
  • 1 篇 rifki sadikin
  • 1 篇 routray kasturi
  • 1 篇 park youngho
  • 1 篇 rahman atiqur
  • 1 篇 he yunlong

语言

  • 10 篇 英文
  • 1 篇 其他
检索条件"主题词=Ciphertext Policy Attribute Based Encryption"
11 条 记 录,以下是1-10 订阅
排序:
Revocable Sliced ciphertext policy attribute based encryption Scheme in Cloud Computing  15
Revocable Sliced CipherText Policy Attribute Based Encryptio...
收藏 引用
15th IEEE International Wireless Communications and Mobile Computing Conference (IEEE IWCMC)
作者: Bouchaala, Mariem Ghazel, Cherif Saidane, Leila Azouz Univ Manouba Tunisia ENSI CRISTAL Lab Manouba Tunisia
Cloud Computing is the most promising paradigm in recent times. It offers a cost-efficient service to individual and industries. However, outsourcing sensitive data to entrusted Cloud servers presents a brake to Cloud... 详细信息
来源: 评论
A Fully Secure ciphertext-policy attribute-based encryption With a Tree-based Access Structure
收藏 引用
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 2015年 第1期31卷 247-265页
作者: Rifki, Sadikin Park, YoungHo Moon, SangJae Kyungpook Natl Univ Sch Elect Engn & Comp Sci Taegu 702701 South Korea Kyungpook Natl Univ Sch Elect Engn Taegu 702701 South Korea Indonesian Inst Sci Res Ctr Informat Bandung 40135 Indonesia
A new fully secure ciphertext-policy attributed based encryption (CP-ABE) scheme with high expressibity access policy is presented. Our CP-ABE scheme uses tree-based access structure which includes AND, OR, threshold ... 详细信息
来源: 评论
Oblivious Transfer with Fine Grained Access Control from ciphertext policy attribute based encryption in the Standard Model
收藏 引用
INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING 2016年 第1期9卷 285-302页
作者: Fu, Xingbing Li, Fagen Zeng, Shengke Univ Elect Sci & Technol China Sch Informat & Software Engn Chengdu 610054 Sichuan Peoples R China Xihua Univ Sch Math & Comp Engn Chengdu Sichuan Peoples R China
In this work, an oblivious transfer with complex access control scheme that is constructed based on ciphertext policy attribute based encryption (CP-ABE) scheme is proposed. In this scheme, the database server can enf... 详细信息
来源: 评论
TRAK-CPABE: A novel Traceable, Revocable and Accountable ciphertext-policy attribute-based encryption scheme in cloud computing
收藏 引用
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS 2021年 61卷
作者: Bouchaala, Mariem Ghazel, Cherif Saidane, Leila Azzouz Univ Manouba ENSI CRISTAL Lab Manouba Tunisia
ciphertext policy attribute based encryption (CPABE) offers fine-grained access control in Cloud Computing environment. It is considered as the most promising one-to-many encryption mechanism. However, a Cloud user ca... 详细信息
来源: 评论
Privacy preserving spatio-temporal attribute-based encryption for cloud applications
收藏 引用
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS 2025年 第1期28卷 1-26页
作者: Routray, Kasturi Bera, Padmalochan Indian Inst Technol Bhubaneswar India
Cloud computing offers scalable implementation of applications by sharing internet-based storage and computing resources. However, its ubiquitous nature introduces the security and privacy risks to sensitive data. Exi... 详细信息
来源: 评论
An Enhanced CP-ABE based Access Control Algorithm for Point to Multi-Point Communication in Cloud Computing
收藏 引用
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 2017年 第3期33卷 837-858页
作者: Shynu, P. G. Singh, K. John VIT Univ Sch Informat Technol & Engn Vellore 632014 Tamil Nadu India
ciphertext policy attribute-based encryption (CP-ABE) is a well-known access control technique, where the data content shared by a single user is accessed by several authorized entities with distinct data access right... 详细信息
来源: 评论
Secure Encrypted Data Deduplication based on Data Popularity
收藏 引用
MOBILE NETWORKS & APPLICATIONS 2021年 第4期26卷 1686-1695页
作者: He, Yunlong Xian, Hequn Wang, Liming Zhang, Shuguang Qingdao Univ Coll Comp Sci & Technol Qingdao 266071 Peoples R China Xidian Univ State Key Lab Integrated Serv Networks Xian 710071 Peoples R China Chinese Acad Sci Inst Informat Engn Beijing 100093 Peoples R China
Deduplication eliminates duplicated data copies and reduces storage costs of cloud service providers. However, deduplication of encrypted data is difficult. Current solutions rely heavily on trusted third parties, and... 详细信息
来源: 评论
Permanent Revocation in attribute based Broadcast encryption
Permanent Revocation in Attribute Based Broadcast Encryption
收藏 引用
ASE International Conference on Cyber Security (CyberSecurity) / ASE International Conference on Social Informatics (SocialInformatics) / ASE International Conference on Biomedical Computing (BioMedCom)
作者: Dolev, Shlomi Gilboa, Niv Kopeetsky, Marina Ben Gurion Univ Negev Dept Comp Sci IL-84105 Beer Sheva Israel Ben Gurion Univ Negev Dept Commun Syst Engn IS-84105 Beer Sheva Israel Sami Shamoon Coll Engn Dept Software Engn IS-84100 Beer Sheva Israel
We propose a new and efficient scheme for broadcast encryption. A broadcast encryption system allows a broadcaster to send an encrypted message to a dynamically chosen subset RS, |RS| = n, of a given set of users, suc... 详细信息
来源: 评论
Dual Revocation: attribute and User Revocation based On CPABE In Cloud Computing  15
Dual Revocation: Attribute and User Revocation Based On CPAB...
收藏 引用
15th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)
作者: Bouchaala, Mariem Ghazel, Cherif Saidane, Leila Azouz Univ Manouba Tunisia ENSI CRISTAL Lab Manouba Tunisia
Access Control models are required to secure Cloud Computing from unauthorized access. As an efficient cryptographic tool, ciphertext policy attribute based encryption offers a fine-grained access to user assets. But,... 详细信息
来源: 评论
Secure Data Provenance in Internet of Things based Networks by Outsourcing attribute based Signatures and using Bloom Filters
收藏 引用
INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS 2019年 第5期10卷 221-226页
作者: Siddiqui, Muhammad Shoaib Rahman, Atiqur Nadeem, Adnan Alzahrani, Ali M. Islamic Univ Madinah Fac Comp & Informat Syst Medina Saudi Arabia
With the dawn of autonomous organization and network and service management, the integration of existing networks with Internet of Things (IoT) based networks is becoming a reality. With minimal human interaction, the... 详细信息
来源: 评论