Citation: | NIU Shaozhang, TU Shanshan, Huang Yongfeng. An Effective and Secure Access Control System Scheme in the Cloud[J]. Chinese Journal of Electronics, 2015, 24(3): 524-528. doi: 10.1049/cje.2015.07.015 |
K. Yang, X. Jia, K. Ren, B. Zhang and R. Xie, "Effective data access control for multi-authority cloud storage", IEEE Trans. Systems Information Forensics and Security, Vol.8, No.11, pp.1790-1801, 2013.
|
M. Li, S. Yu, Y. Zheng, K. Ren and W. Lou, "Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption", IEEE Trans. Parallel Distrib. Syst., Vol.24, No.1, pp.131-143, 2013.
|
S. Yu, C. Wang, K. Ren, et al., "Achieving secure, scalable, and fine-grained data access control in cloud computing", Proc. of INFOCOM, San Diego, CA, pp.534-542, 2010.
|
K. Yang, X. Jia and K. Ren, "Attribute-based fine-grained access control with efficient revocation in cloud storage systems", Proc. of ASIACCS, NY, USA, pp.523-528, 2013.
|
C. Wang, Q. Wang, K. Ren and W. Lou, "Towards secure and dependable storage services in cloud computing", IEEE Trans. Service Computing, Vol.5, No.2, pp.220-232, 2012.
|
S. Tu, S. Niu and M. Li, "An efficient access control scheme for cloud environment", Cybernetics and Information Technologies, Vol.13, No.3, pp.77-90, 2013.
|
J. Bethencourt, A. Sahai and B. Waters, "Ciphertext-policy attribute-based encryption", Proc. of IEEE Symposium on Security and Privacy, Oakland, California, USA, pp.321-334, 2007.
|