咨询与建议

限定检索结果

文献类型

  • 58 篇 期刊文献
  • 40 篇 会议
  • 1 篇 学位论文

馆藏范围

  • 99 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 94 篇 工学
    • 79 篇 计算机科学与技术...
    • 29 篇 电气工程
    • 26 篇 信息与通信工程
    • 20 篇 软件工程
    • 6 篇 网络空间安全
    • 4 篇 控制科学与工程
    • 2 篇 机械工程
    • 2 篇 仪器科学与技术
    • 2 篇 电子科学与技术(可...
    • 1 篇 土木工程
    • 1 篇 交通运输工程
    • 1 篇 生物医学工程(可授...
  • 9 篇 理学
    • 4 篇 数学
    • 4 篇 化学
    • 3 篇 生物学
    • 1 篇 系统科学
  • 5 篇 管理学
    • 3 篇 管理科学与工程(可...
    • 2 篇 公共管理
    • 1 篇 图书情报与档案管...
  • 4 篇 军事学
    • 4 篇 军队指挥学
  • 3 篇 医学
    • 3 篇 基础医学(可授医学...
    • 1 篇 公共卫生与预防医...

主题

  • 99 篇 ciphertext-polic...
  • 22 篇 cloud computing
  • 20 篇 access control
  • 8 篇 searchable encry...
  • 8 篇 cloud storage
  • 7 篇 security
  • 7 篇 encryption
  • 6 篇 blockchain
  • 6 篇 attribute revoca...
  • 5 篇 user revocation
  • 4 篇 access structure
  • 4 篇 cp-abe
  • 4 篇 servers
  • 3 篇 data security
  • 3 篇 data sharing
  • 3 篇 collusion-resist...
  • 3 篇 keyword search
  • 3 篇 wireless sensor ...
  • 3 篇 policy hiding
  • 3 篇 attribute-based ...

机构

  • 5 篇 east china norma...
  • 5 篇 singapore manage...
  • 4 篇 univ texas san a...
  • 4 篇 sun yat sen univ...
  • 3 篇 beihang univ sch...
  • 3 篇 shanghai jiao to...
  • 3 篇 beihang univ bei...
  • 3 篇 yunnan univ natl...
  • 3 篇 fuzhou univ coll...
  • 2 篇 beihang univ eco...
  • 2 篇 chinese acad sci...
  • 2 篇 int inst informa...
  • 2 篇 aletheia univ de...
  • 2 篇 shenzhen univ co...
  • 2 篇 minist educ key ...
  • 2 篇 zhengzhou inform...
  • 2 篇 southeast univ s...
  • 2 篇 guilin univ elec...
  • 2 篇 singapore manage...
  • 2 篇 china univ geosc...

作者

  • 5 篇 choo kim-kwang r...
  • 5 篇 cao zhenfu
  • 5 篇 liu ximeng
  • 4 篇 dong xiaolei
  • 4 篇 deng robert h.
  • 3 篇 chen chen
  • 3 篇 zhao zhiyuan
  • 3 篇 yao wang
  • 3 篇 zhang xiao
  • 3 篇 ning jianting
  • 3 篇 wu faguo
  • 3 篇 wang changji
  • 3 篇 chen wei
  • 3 篇 shi jiaoli
  • 2 篇 wang jing
  • 2 篇 ma jianfeng
  • 2 篇 huang win-bin
  • 2 篇 das ashok kumar
  • 2 篇 liang kaitai
  • 2 篇 wang haijiang

语言

  • 94 篇 英文
  • 4 篇 其他
  • 1 篇 中文
检索条件"主题词=Ciphertext-policy attribute-based encryption"
99 条 记 录,以下是41-50 订阅
排序:
Provably secure attribute-based encryption with attribute revocation and grant function using proxy re-encryption and attribute key for updating
收藏 引用
HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES 2015年 第1期5卷 1页
作者: Naruse, Takeru Mohri, Masami Shiraishi, Yoshiaki Nagoya Inst Technol Nagoya Aichi Japan Gifu Univ Informat & Multimedia Ctr Gifu Japan Kobe Univ Dept Elect & Elect Engn Kobe Hyogo 657 Japan
ciphertext-policy attribute-based encryption (CP-ABE) is suitable for data access control on a cloud storage system. In CP-ABE, the data owner encrypts data under the access structure over attributes and a set of attr... 详细信息
来源: 评论
CryptCloud+: Secure and Expressive Data Access Control for Cloud Storage
收藏 引用
IEEE TRANSACTIONS ON SERVICES COMPUTING 2021年 第1期14卷 111-124页
作者: Ning, Jianting Cao, Zhenfu Dong, Xiaolei Liang, Kaitai Wei, Lifei Choo, Kim-Kwang Raymond Natl Univ Singapore Dept Comp Sci Singapore 119077 Singapore East China Normal Univ Shanghai Key Lab Trustworthy Comp Shanghai 200062 Peoples R China Univ Surrey Dept Comp Sci Guildford GU2 7XH Surrey England Shanghai Ocean Univ Sch Informat Technol Shanghai 201306 Peoples R China Univ Texas San Antonio Dept Informat Syst & Cyber Secur San Antonio TX 78249 USA
Secure cloud storage, which is an emerging cloud service, is designed to protect the confidentiality of outsourced data but also to provide flexible data access for cloud users whose data is out of physical control. C... 详细信息
来源: 评论
Achieving Flexible and Self-Contained Data Protection in Cloud Computing
收藏 引用
IEEE ACCESS 2017年 5卷 1510-1523页
作者: Lang, Bo Wang, Jinmiao Liu, Yanxi Beihang Univ State Key Lab Software Dev Environm Beijing 100191 Peoples R China
For enterprise systems running on public clouds in which the servers are outside the control domain of the enterprise, access control that was traditionally executed by reference monitors deployed on the system server... 详细信息
来源: 评论
An Access Control Scheme With Privacy-Preserving Authentication and Flexible Revocation for Smart Healthcare
收藏 引用
IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS 2024年 第6期28卷 3269-3278页
作者: Liang, Xiyu Liu, Yali Ning, Jianting Jiangsu Normal Univ Coll Comp Sci & Technol Xuzhou 221116 Peoples R China Guilin Univ Elect Technol Guangxi Key Lab Cryptog & Informat Secur Guilin 541004 Peoples R China Fujian Normal Univ Coll Comp & Cyber Secur Fujian Prov Key Lab Network Secur & Cryptol Fuzhou 350117 Peoples R China Chinese Acad Sci Inst Informat Engn State Key Lab Informat Secur Beijing 100093 Peoples R China
IoT and 5G-enabled smart healthcare allows medical practitioners to diagnose patients from any location via electronic health records (EHRs) by wireless body area network (WBAN) devices. Privacy, including the medical... 详细信息
来源: 评论
RL-ABE: A Revocable Lattice attribute based encryption Scheme based on R-LWE Problem in Cloud Storage
收藏 引用
IEEE TRANSACTIONS ON SERVICES COMPUTING 2022年 第2期15卷 1026-1035页
作者: Zhao, Siyu Jiang, Rui Bhargava, Bharat Southeast Univ Sch Informat Sci & Engn Nanjing 210096 Jiangsu Peoples R China Southeast Univ Sch Cyber Sci & Engn Nanjing 210096 Jiangsu Peoples R China Purdue Univ Dept Comp Sci W Lafayette IN 47907 USA
In this article, we propose a revocable lattice-based CP-ABE (ciphertext-policy attribute-based encryption) scheme (RL-ABE), which is suitable to be applied in the cloud storage. The RL-ABE scheme can resist quantum a... 详细信息
来源: 评论
attribute-based Keyword Search over Hierarchical Data in Cloud Computing
收藏 引用
IEEE TRANSACTIONS ON SERVICES COMPUTING 2020年 第6期13卷 985-998页
作者: Miao, Yinbin Ma, Jianfeng Liu, Ximeng Li, Xinghua Jiang, Qi Zhang, Junwei Xidian Univ Dept Cyber Engn Xian 710071 Peoples R China Singapore Management Univ Dept Informat Syst 80 Stamford Rd Singapore 188065 Singapore
Searchable encryption (SE) has been a promising technology which allows users to perform search queries over encrypted data. However, the most of existing SE schemes cannot deal with the shared records that have hiera... 详细信息
来源: 评论
A secure, efficient and verifiable multimedia data sharing scheme in fog networking system
收藏 引用
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS 2021年 第1期24卷 225-247页
作者: Tu, Yuanfei Yang, Geng Wang, Jing Su, Qingjian Nanjing Univ Post & Telecommun Coll Comp Sci & Technol Nanjing 210003 Peoples R China Jiangsu Key Lab Big Data Secur & Intelligent Proc Nanjing 210023 Peoples R China Nanjing Tech Univ Coll Comp Sci & Technol Nanjing 211800 Peoples R China
As an emerging and efficient paradigm for multimedia systems, fog networking has attracted widespread attention over the last few years. However, an increasing number of attacks in the current virtualized environments... 详细信息
来源: 评论
Secure and Efficient attribute-based encryption with Keyword Search
收藏 引用
COMPUTER JOURNAL 2018年 第8期61卷 1133-1142页
作者: Wang, Haijiang Dong, Xiaolei Cao, Zhenfu Li, Dongmei Shanghai Jiao Tong Univ Dept Comp Sci & Engn Shanghai Peoples R China East China Normal Univ Shanghai Key Lab Trustworthy Comp Shanghai Peoples R China
attribute-based encryption with keyword search (ABKS) is a system that supports keyword search and access control. By inheriting from attribute-based encryption technology, most current ABKS schemes incur large comput... 详细信息
来源: 评论
ABAKA: A novel attribute-based k-anonymous collaborative solution for LBSs
收藏 引用
COMPUTER COMMUNICATIONS 2016年 85卷 1-13页
作者: Dargahi, Tooska Ambrosin, Moreno Conti, Mauro Asokan, N. Islamic Azad Univ West Tehran Branch Dept Comp Engn Tehran Iran Univ Padua Dept Math Padua Italy Aalto Univ Dept Comp Sci Helsinki Finland Univ Helsinki Helsinki Finland
The increasing use of mobile devices, along with advances in telecommunication systems, increased the popularity of Location-based Services (LBSs). In LBSs, users share their exact location with a potentially untruste... 详细信息
来源: 评论
Designing quantum-secure attribute-based encryption
收藏 引用
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS 2024年 第9期27卷 13075-13091页
作者: Rao, Y. Sreenivasa Srivastava, Vikas Mohanty, Tapaswini Debnath, Sumit Kumar Natl Inst Technol Warangal Dept Math Warangal Telangana India Natl Inst Technol Jamshedpur Dept Math Jamshedpur Jharkhand India
In the last couple of decades, attribute-based encryption (ABE) has been a promising encryption technique to realize fine-grained access control over encrypted data. ABE has appealing functionalities such as (i) acces... 详细信息
来源: 评论