[1] |
ZHAO Zhenkai, QIN Bo.The Research of Data Security Technology in Cloud Storage[J]. Information Security And Communications Privacy, 2018(2): 75-82.
|
|
赵振凯,秦波.云存储中的数据安全技术[J].信息安全与通信保密,2018(2):75-82.
|
[2] |
FENG Chaosheng, QIN Zhiguang, YUAN Ding.Techniques of Secure Storage for Cloud Data[J]. Chinese Journal of Computers, 2015, 38(1): 150-163.
|
|
冯朝胜,秦志光,袁丁.云数据安全存储技术[J].计算机学报,2015,38(1):150-163.
|
[3] |
SHAMIR A.Identity-based Cryptosystems and Signature Schemes[C]//Springer. 1984 Advances in Cryptology, August 19-22, Santa Barbara, CA, USA. Heidelberg: Springer, 1984: 47-53.
|
[4] |
HU V C, KUHN D R, FERRAIOLO D F, et al.Attribute-based Access Control[J]. Computer, 2015, 48(2): 85-88.
|
[5] |
PRAVEEN K P, SYAM K P, ALPHONSE P J A. Attribute Based Encryption in Cloud Computing: A Survey, Gap Analysis, and Future Directions[J]. Journal of Network and Computer Applications, 2018, 108(1): 37-52.
|
[6] |
TENG wei, YANG Geng, XIANG Yang, et al. Attribute-based Access Control with Constant-size Ciphertext in Cloud Computing[J]. IEEE Transactions on Cloud Computing, 2017, 5(4): 617-627.
|
[7] |
SHI Yue, LI Xianglong, DAI Fangfang.An Enhanced Security Framework of Software Defined Network Based on Attribute-based Encryption[J]. Netinfo Security, 2018, 18(1): 15-22.
|
|
石悦,李相龙,戴方芳.一种基于属性基加密的增强型软件定义网络安全框架[J].信息网络安全,2018,18(1):15-22.
|
[8] |
SAHAI A, WATERS B R.Fuzzy Identity Based Encryption[C]//Springer. 24th Annual International Conference on Theory and Applications of Cryptographic Techniques, May 22-26, 2005, Aarhus, Denmark. Heidelberg: Springer, 2004: 457-473.
|
[9] |
QING Yong, SUN Wei, XIONG Hu, et al.Outsourcing Encryption and Decryption CP-ABE Scheme with Revocation Storage in Cloud Computing[J]. Netinfo Security, 2017, 17(6): 6-8.
|
|
卿勇,孙伟,熊虎,等.云计算中可撤销存储的外包加解密CP-ABE方案[J].信息网络安全,2017,17(6):6-8.
|
[10] |
BETHENCOURT J, SAHAI A, WATERS B.Ciphertext-policy Attribute-based Encryption[C]//IEEE. 2007 IEEE Symposium on Security and Privacy, May 20-23, 2007, Berkeley, CA, USA. New Jersey: IEEE, 2007: 321-334.
|
[11] |
ZHONG Hong, CUI Jie, ZHU Wenlong, et al.Efficient and Verifiable Muti-authority Attribute Based Encryption Scheme[J]. Journal of Software, 2018, 29(7): 184-195.
|
|
仲红,崔杰,朱文龙,等.高效且可验证的多授权机构属性基加密方案[J].软件学报,2018,29(7):184-195.
|