[1] |
CAMPBELL A T, EISENMAN S B, LANE N D, et al.The Rise of People-Centric Sensing[J]. IEEE Internet Computing, 2008, 12(4): 12-21.
|
[2] |
CAO Lei.Cloud Outsourcing Attribute Base Encryption for Hidden Structure in Mobile Medical Service [D]. Xi’an: Xidian University, 2015.
|
|
曹磊. 移动医疗中隐藏访问结构的云外包属性基加密[D]. 西安: 西安电子科技大学, 2015.
|
[3] |
QIU Yue.Information Security Analysis in Wearable Devices[J]. Netinfo Security, 2016, 16(9): 79-83.
|
|
裘玥. 智能可穿戴设备信息安全分析[J]. 信息网络安全, 2016,16(9):79-83.
|
[4] |
SWEENEY L.Uniqueness of Simple Demographics in the US Population[J]. Computers & Security, 2001, 30(2-3): 88-97.
|
[5] |
SAMARATI P, SWEENEY L.Generalizing Data to Provide Anonymity when Disclosing Information[C]// ACM. Special Interest Group on Algorithms and Computation Theory, Proceedings of the 17th ACM Sigact-Sigmod-Sigart Symposiumon Principles of Database System, June1-3, 1998, Seattle, Washington, USA.New York: ACM, 1998:188.
|
[6] |
ZHANG Dajun, LI Yunfa, ZHENG Zhou.The Mechanism of Data Resources Secure Sharing in Cloud Computing[J]. Netinfo Security, 2012, 12(8): 79-82.
|
|
张大军, 李运发, 郑周. 云计算中数据资源的安全共享机制[J]. 信息网络安全, 2012,12(8):79-82.
|
[7] |
GATES C.Access Control Requirements for Web 2.0 Security and Privacy[C]// ACM. Workshop on Web 2.0 Security & Privacy, ACM Symposium on Information, Computer and Communications Security, August 23-25, 2007,Incheon, Korea. New York:ACM, 2007:27-42.
|
[8] |
CARMINATI B, FERRARI E, HEATHERLY R.Semantic Web-based Social Network Access Control[J]. Computers & Security, 2011, 30(2): 108-115.
|
[9] |
FONG P, ANWAR M, ZHAO Z.A Privacy Preservation Model for Facebook-Style Social Network Systems[J]. Computers & Security, 2009, 5789(12):303-320.
|
[10] |
FONG P W L, SIAHAAN I. Relationship-based Access Control Policies and Their Policy Languages[C]// ACM. Special Interest Group on Security, Audit, and Control, ACM Symposium on Access Control MODELS and Technologies, June 15-17, 2011, Shanghai, China. New York: ACM, 2011: 51-60.
|
[11] |
NIN J, TORRA V.Possibilistic Reasoning for Trust-Based Access Control Enforcement in Social Networks[C]// IEEE.International Conference on Fuzzy Systems, July 18-23, 2010, Barcelona, Spain. New York: IEEE, 2011: 1-6.
|
[12] |
CRAMPTON J, SELLWOOD J.Inter-ReBAC: Inter-Operation of Relationship-Based Access Control Model Instances[C]// IFIP, International Conference on Data and Applications Security and Privacy, May 30 - June 1, 2016, Ghent, Belgium. Laxenburg: IFIP, 2016: 1-10.
|
[13] |
LOU Jiapeng, ZHANG Shutian, ZHANG Yi, et al.Design and Implementation of Privacy Preserving System on the Internet[J]. Netinfo Security, 2013, 13(9): 35-40.
|
|
娄嘉鹏, 张曙天, 张怡,等. 互联网安全隐私保护系统设计与实现[J]. 信息网络安全, 2013,13(9): 35-40.
|
[14] |
PARK J, SANDHU R, GHANTA S.RBAC on the Web by Secure Cookies[C]// IFIP. International Conference on Database Security: Research Advances in Database and Information Systems Security, May 21-24, Kluwer. Laxenburg: IFIP, 1999: 1-10.
|
[15] |
PANG J, ZHANG Y.A New Access Control Scheme for Facebook-Style Social Networks[C]// IEEE, International Conference on Availability, Reliability and Security,September 8-12, 2014, University of Fribourg, Switzerland. New York: IEEE. 2014: 1-6.
|
[16] |
BETHENCOURT J, SAHAI A, WATERS B.Ciphertext-policy attribute-based encryption[C]// IEEE, Symposium on Security and Privacy, May 20-23, 2007, Oakland, USA. New York: IEEE, 2007: 1-29.
|
[17] |
GOYAL V, PANDEY O, SAHAI A, et al.Attribute-Based Encryption for Fine-grained Access Control of Encrypted Data[C]// ACM. Conference on Computer and Communications Security, October 30-November 3, 2006, Alexandria, USA. New York: ACM, 2006: 1-28.
|
[18] |
ATTRAPADUNG N, IMAI H.Dual-policy Attribute Based Encryption[C]// Springer. International Conference on Applied Cryptography and Network Security, June 2-5, 2009, Paris, France. Berlin: Springer, 2009: 168-185.
|
[19] |
LEWKO A B, OKAMOTO T, SAHAI A, et al.Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption[C]// Springer. Annual International Conference on the Theory and Applications of Cryptographic Techniques, May 30-June 3, French, Riviera. Berlin: Springer, 2010: 62-91.
|
[20] |
BETHENCOURT J, SAHAI A, WATERS B.Ciphertext-Policy Attribute-Based Encryption[C] // IEEE. Symposium on Security and Privacy, May 20-23, 2007, Oakland, USA. New York: IEEE, 2007: 1-29.
|
[21] |
XIAO L, LIU M.Linear Multi-secret Sharing Schemes[J]. Science in China Series F: Information Sciences, 2005, 48(1): 125-136.
|
[22] |
NIKOV V, NIKOVA S.New Monotone Span Programs from Old[J]. Iacr Cryptology Eprint Archive, 2004,2(1):56-70.
|
[23] |
LIAO Jingxue, CHEN Fuzhen, CHENG Jiujun, et al.Privacy Protection System for Innovative Service Platform of Community Internet of Things[J]. Netinfo Security, 2016, 16(12): 60-67.
|
|
廖竞学, 陈福臻, 程久军,等. 面向社区物联网创新服务平台的隐私保护系统[J]. 信息网络安全, 2016,16(12):60-67.
|
[24] |
SHERIDAN D.The Optimality of a Fast CNF Conversion and Its Use with SAT[J]. Proc. of SAT, 2004, 4(3):32-47.
|