咨询与建议

限定检索结果

文献类型

  • 58 篇 期刊文献
  • 40 篇 会议
  • 1 篇 学位论文

馆藏范围

  • 99 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 94 篇 工学
    • 79 篇 计算机科学与技术...
    • 29 篇 电气工程
    • 26 篇 信息与通信工程
    • 20 篇 软件工程
    • 6 篇 网络空间安全
    • 4 篇 控制科学与工程
    • 2 篇 机械工程
    • 2 篇 仪器科学与技术
    • 2 篇 电子科学与技术(可...
    • 1 篇 土木工程
    • 1 篇 交通运输工程
    • 1 篇 生物医学工程(可授...
  • 9 篇 理学
    • 4 篇 数学
    • 4 篇 化学
    • 3 篇 生物学
    • 1 篇 系统科学
  • 5 篇 管理学
    • 3 篇 管理科学与工程(可...
    • 2 篇 公共管理
    • 1 篇 图书情报与档案管...
  • 4 篇 军事学
    • 4 篇 军队指挥学
  • 3 篇 医学
    • 3 篇 基础医学(可授医学...
    • 1 篇 公共卫生与预防医...

主题

  • 99 篇 ciphertext-polic...
  • 22 篇 cloud computing
  • 20 篇 access control
  • 8 篇 searchable encry...
  • 8 篇 cloud storage
  • 7 篇 security
  • 7 篇 encryption
  • 6 篇 blockchain
  • 6 篇 attribute revoca...
  • 5 篇 user revocation
  • 4 篇 access structure
  • 4 篇 cp-abe
  • 4 篇 servers
  • 3 篇 data security
  • 3 篇 data sharing
  • 3 篇 collusion-resist...
  • 3 篇 keyword search
  • 3 篇 wireless sensor ...
  • 3 篇 policy hiding
  • 3 篇 attribute-based ...

机构

  • 5 篇 east china norma...
  • 5 篇 singapore manage...
  • 4 篇 univ texas san a...
  • 4 篇 sun yat sen univ...
  • 3 篇 beihang univ sch...
  • 3 篇 shanghai jiao to...
  • 3 篇 beihang univ bei...
  • 3 篇 yunnan univ natl...
  • 3 篇 fuzhou univ coll...
  • 2 篇 beihang univ eco...
  • 2 篇 chinese acad sci...
  • 2 篇 int inst informa...
  • 2 篇 aletheia univ de...
  • 2 篇 shenzhen univ co...
  • 2 篇 minist educ key ...
  • 2 篇 zhengzhou inform...
  • 2 篇 southeast univ s...
  • 2 篇 guilin univ elec...
  • 2 篇 singapore manage...
  • 2 篇 china univ geosc...

作者

  • 5 篇 choo kim-kwang r...
  • 5 篇 cao zhenfu
  • 5 篇 liu ximeng
  • 4 篇 dong xiaolei
  • 4 篇 deng robert h.
  • 3 篇 chen chen
  • 3 篇 zhao zhiyuan
  • 3 篇 yao wang
  • 3 篇 zhang xiao
  • 3 篇 ning jianting
  • 3 篇 wu faguo
  • 3 篇 wang changji
  • 3 篇 chen wei
  • 3 篇 shi jiaoli
  • 2 篇 wang jing
  • 2 篇 ma jianfeng
  • 2 篇 huang win-bin
  • 2 篇 das ashok kumar
  • 2 篇 liang kaitai
  • 2 篇 wang haijiang

语言

  • 94 篇 英文
  • 4 篇 其他
  • 1 篇 中文
检索条件"主题词=Ciphertext-policy attribute-based encryption"
99 条 记 录,以下是71-80 订阅
A secure and efficient ciphertext-policy attribute-based Proxy Re-encryption for cloud data sharing
收藏 引用
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE 2015年 52卷 95-108页
作者: Liang, Kaitai Au, Man Ho Liu, Joseph K. Susilo, Willy Wong, Duncan S. Yang, Guomin Yu, Yong Yang, Anjia City Univ Hong Kong Dept Comp Sci Hong Kong Hong Kong Peoples R China Hong Kong Polytech Univ Dept Comp Hong Kong Hong Kong Peoples R China ASTAR Inst Infocomm Res Singapore Singapore Univ Wollongong Sch Comp Sci & Software Engn Ctr Comp & Informat Secur Res Wollongong NSW 2522 Australia
Proxy Re-encryption (PRE) is a useful cryptographic primitive that allows a data owner to delegate the access rights of the encrypted data stored on a cloud storage system to others without leaking the information of ... 详细信息
来源: 评论
A Blockchain-based Access Control System for Cloud Storage
A Blockchain-Based Access Control System for Cloud Storage
收藏 引用
IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (ElConRus)
作者: Sukhodolskiy, Ilya Zapechnikov, Sergey Natl Res Nucl Univ MEPhI Dept Cryptol & Cybersecur Moscow Engn Phys Inst Moscow Russia
In this paper, we present a prototype of multi-user system for access control to datasets stored in an untrusted cloud environment. Cloud storage like any other untrusted environment needs the ability to secure share ... 详细信息
来源: 评论
Two-layer ciphertext-policy attribute-based Proxy Re-encryption for Supporting PHR Delegation  19
Two-layer Ciphertext-Policy Attribute-Based Proxy Re-encrypt...
收藏 引用
International Computer Science and Engineering Conference (ICSEC)
作者: Wungpornpaiboon, G. Vasupongayya, S. Prince Songkla Univ Fac Engn Dept Comp Engn Hat Yai 90112 Songkhla Thailand
Medical treatment sometimes requires a case forwarding to a doctor who has a specific expertise. Typically, an electronic medical record (EMS) of a patient can be passed to another doctor without asking the patient be... 详细信息
来源: 评论
Multi-keyword Ranked Searchable encryption Supporting CP-ABE Test
Multi-keyword Ranked Searchable Encryption Supporting CP-ABE...
收藏 引用
IEEE International Conference on Computing, Communications and IoT Applications
作者: Chuxin Wu Hongwei Liu Peng Zhang Yuhong Liu ATR Key Laboratory of National Defense Technology College of Electronics and Information Engineering Shenzhen University Shenzhen Technology University Department of Computer Engineering Santa Clara University
Internet of Things (IoT) and cloud computing are promising technologies that change the way people communicate and live. As the data collected through IoT devices often involve users' private information and the c... 详细信息
来源: 评论
Multi-authority attribute-based encryption scheme with constant-size ciphertexts and user revocation
收藏 引用
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE 2019年 第21期31卷
作者: Zhang, Xiao Wu, Faguo Yao, Wang Wang, Zhao Wang, Wenhua Beihang Univ Sch Math & Syst Sci Beijing 100191 Peoples R China Beihang Univ Ecole Cent Pekin Sino French Engineer Sch Beijing Peoples R China Minist Educ Key Lab Math Informat & Behav Semant Beijing Peoples R China Beihang Univ Beijing Adv Innovat Ctr Big Data & Brain Comp Beijing Peoples R China AVIC Econ & Technol Res Estab Beijing Peoples R China
ciphertext-policy attribute-based encryption (CP-ABE) is regarded as one of the most suitable technologies for data access control in cloud storage system. It gives data owners direct and flexible control on access po... 详细信息
来源: 评论
Achieving Flexible and Self-Contained Data Protection in Cloud Computing
收藏 引用
IEEE ACCESS 2017年 5卷 1510-1523页
作者: Lang, Bo Wang, Jinmiao Liu, Yanxi Beihang Univ State Key Lab Software Dev Environm Beijing 100191 Peoples R China
For enterprise systems running on public clouds in which the servers are outside the control domain of the enterprise, access control that was traditionally executed by reference monitors deployed on the system server... 详细信息
来源: 评论
Pairing-based CP-ABE with constant-size ciphertexts and secret keys for cloud environment
收藏 引用
COMPUTER STANDARDS & INTERFACES 2017年 第Part1期54卷 3-9页
作者: Odelu, Vanga Das, Ashok Kumar Rao, Y. Sreenivasa Kumari, Saru Khan, Muhammad Khurram Choo, Kim-Kwang Raymond Indian Inst Technol Dept Math Kharagpur 721302 W Bengal India Int Inst Informat Technol Ctr Secur Theory & Algorithm Res Hyderabad 500032 Andhra Pradesh India Ch Charan Singh Univ Dept Math Meerut 250005 Uttar Pradesh India King Saud Univ Ctr Excellence Informat Assurance Riyadh 11451 Saudi Arabia China Univ Geosci Sch Comp Sci Wuhan 430074 Peoples R China Univ South Australia Sch Informat Technol & Math Sci Adelaide SA 5001 Australia Univ Texas San Antonio Dept Informat Syst & Cyber Secur San Antonio TX 78249 USA
ciphertext-policy attribute-based encryption (CP-ABE) scheme can be deployed in a mobile cloud environment to ensure that data outsourced to the cloud will be protected from unauthorized access. Since mobile devices a... 详细信息
来源: 评论
Expressive CP-ABE Scheme for Mobile Devices in loT Satisfying Constant-Size Keys and ciphertexts
收藏 引用
IEEE ACCESS 2017年 5卷 3273-3283页
作者: Odelu, Vanga Das, Ashok Kumar Khan, Muhammad Khurram Choo, Kim-Kwang Raymond Jo, Minho Indian Inst Informat Technol Dept Comp Convergence Software Sricity 517588 India Int Inst Informat Technol Ctr Secur Theory & Algorithm Res Hyderabad 500032 Andhra Pradesh India King Saud Univ Ctr Excellence Informat Assurance Riyadh 12372 Saudi Arabia Univ Texas San Antonio Dept Informat Syst & Cyber Secur San Antonio TX 78249 USA Korea Univ Dept Comp Convergence Software Sejong Metropolitan City 30019 South Korea
Designing lightweight security protocols for cloud-based Internet-of-Things (IoT) applications for battery-limited mobile devices, such as smart phones and laptops, is a topic of recent focus. ciphertext-policy attrib... 详细信息
来源: 评论
An Efficient Framework for Verifiable Access Control based Dynamic Data Updates in Public Cloud  13th
An Efficient Framework for Verifiable Access Control Based D...
收藏 引用
13th International Conference on Distributed Computing and Internet Technology (ICDCIT)
作者: Sabitha, S. Rajasree, M. S. Engn Coll Trivandrum Kerala India IIITM K Trivandrum Kerala India
attribute-based encryption enables the users to get the data only if attributes of the users are satisfied with the access policy embedded in the ciphertext. Whenever it is used in a collaborative environment, user... 详细信息
来源: 评论
attribute-based encryption scheme supporting decryption outsourcing and attribute revocation in cloud storage  20
Attribute-based encryption scheme supporting decryption outs...
收藏 引用
20th IEEE International Conference on Computational Science and Engineering (CSE) / 15th IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (EUC)
作者: Liu, Hongwei Zhu, Ping Chen, Zehong Zhang, Peng Jiang, Zoe L. Shenzhen Univ Coll Informat Engn Shenzhen Peoples R China Shenzhen Univ Coll Informat Engn ATR Key Lab Natl Def Technol Shenzhen Peoples R China Harbin Insititute Technol Shenzhen Grad Sch Shenzhen Peoples R China Guangdong Prov Key Lab High Performance Comp Guangzhou Guangdong Peoples R China
Aiming to reduce the user's computational overhead and tackle the attribute revocation issue, an attribute-based encryption scheme supporting decryption outsourcing and attribute revocation is proposed in this pap... 详细信息
来源: 评论