Citation: | WU Deming, ZHANG Yu, WANG Lina, et al., “EACS: An Efficient Access Control Scheme for Electronic Publishing in Cloud Computing,” Chinese Journal of Electronics, vol. 27, no. 1, pp. 60-69, 2018, doi: 10.1049/cje.2017.11.009 |
B.C. Björk and D. Solomon,"The publishing delay in scholarly peer-reviewed journals", Journal of Informetrics, Vol.7, No.4, pp.914-923, 2013.
|
I. Bermudez, S. Traverso, M. Mellia, et al., "Exploring the cloud from passive measurements:The Amazon AWS case", Proc. of IEEE INFOCOM, Turin, Italy, pp.230-234, 2013.
|
P. Mell and T. Grance, "The NIST definition of cloud computing", Communications of the ACM, Vol.53, No.6, pp.1-7, 2009.
|
H. Zhang, B. Li, et al., "A framework for truthful online auctions in cloud computing with heterogeneous user demands", Proc. of IEEE INFOCOM, Turin, Italy, pp.1510-1518, 2013.
|
H. Xu and B.C. Li, "Joint request mapping and response routing for geo-distributed cloud services", Proc. of IEEE INFOCOM, Turin, Italy, pp.854-862, 2013.
|
F. Wang, J.C. Liu and M.H. Chen, "CALMS:Cloud-assisted live media streaming for globalized demands with time/region diversities", Proc. of IEEE INFOCOM, Orlando, Florida, USA, pp.199-207, 2012.
|
C. Wang, K. Ren, et al., "Achieving usable and privacy-assured similarity search over outsourced cloud data", Proc. of IEEE INFOCOM, Orlando, Florida, USA, pp.451-459, 2012.
|
A. Sahai and B. Waters, "Fuzzy identity-based encryption", Advances in Cryptology-EUROCRYPT 2005, Aarhus, Denmark, pp.457-473, 2005.
|
J. Bethencourt, A. Sahai and B. Waters, "Ciphertext-policy attribute-based encryption", Proc. of IEEE Symposium on Security and Privacy, Berkeley, California, USA, pp.321-334, 2007.
|
V. Goyal, O. Pandey, A. Sahai, et al., "Attribute-based encryption for fine-grained access control of encrypted data", Proc. of the 13th ACM Conference on Computer and Communications Security, Alexandria, Virginia, USA, pp.89-98, 2006.
|
S. Hohenberger and B. Waters, "Attribute-Based Encryption with Fast Decryption", Proc. of Public-Key Cryptography-PKC 2013, Nara, Japan, pp.162-179, 2013
|
H. Takabi, J.B. Joshi and G. Ahn, "Security and Privacy Challenges in Cloud Computing Environments", Proc. of IEEE Symposium on Security and Privacy, Piscataway, New Jersey, pp.24-31, 2010.
|
L.M. Kaufman, "Data security in the world of cloud computing", Proc. of IEEE Symposium on Security and Privacy, Berkeley, California, USA, pp.61-64, 2009.
|
B. Waters, "Ciphertext-policy attribute-based encryption:An expressive, efficient, and provably secure realization", Proc. of Public Key Cryptography-PKC 2011, Taormina, Italy, pp.53-70, 2011.
|
K. Yang, X.H. Jia, K. Ren, et al., "DAC-MACS:Effective data access control for multi-authority cloud storage systems", Proc. of IEEE INFOCOM, Turin, Italy, pp.2895-2903, 2013.
|
P. Xu, Y. Tang, W.B. Jiang, et al., "Ciphertext-Policy Attribute-Based Encryption with Short Keys", Chinese Journal of Electronics, Vol.23, No.4, pp.655-660, 2014.
|
C.I. Fan, S.M. Huang and H.M. Ruan, "Arbitrary-state attribute-based encryption with dynamic membership", IEEE Transactions on Computers, Vol.63, No.8, pp.1951-1961, 2014.
|
J. Baek, W. Susilo and J. Zhou, "New constructions of fuzzy identity-based encryption", Proc. of the 2nd ACM Symposium on Information, Computer and Communications Security, Singapore, pp.368-370, 2007.
|
S. Yu, C. Wang, K. Ren, et al., "Achieving secure, scalable, and fine-grained data access control in cloud computing", Proc. of IEEE INFOCOM, San Diego, California, USA, pp.1-9, 2010.
|
R. Canetti, O. Goldreich and S. Halevi, "The random oracle methodology, revisited", Journal of the ACM (JACM), Vol.51, No.4, pp.557-594, 2004.
|
B. Lynn, "The pairing-based cryptography (PBC) library", http://crypto.stanford.edu/pbc, 2012.
|
B. Waters, "Efficient identity-based encryption without random oracles", Advances in Cryptology-EUROCRYPT 2005, Aarhus, Denmark, pp.114-127, 2005.
|
M. Li, S. Yu, Y. Zheng, et al., "Scalable and secure sharing of personal health records in cloud computing using attributebased encryption", IEEE Transactions on Parallel and Distributed Systems, Vol.24, No.1, pp.457-473, 2013.
|
A. Lewko and B. Waters, "Decentralizing attribute-based encryption", Advances in Cryptology-EUROCRYPT 2011, Tallinn, Estonia, pp.568-588, 2011.
|
S. Yu, K. Ren and W. Lou, "FDAC:Toward fine-grained distributed data access control in wireless sensor networks", IEEE Transactions on Parallel and Distributed Systems, Vol.22, No.4, pp.673-686, 2011.
|
L.K. Guo, C. Zhang, H. Yue, et al., "A Privacy-preserving Social-assisted Mobile Content Dissemination Scheme in DTNs", Proc. of IEEE INFOCOM, Turin, Italy, pp.2301-2309, 2013.
|