Citation: | SHI Jiaoli, HUANG Chuanhe, HE Kai, et al., “ACS-HCA: An Access Control Scheme Under Hierarchical Cryptography Architecture,” Chinese Journal of Electronics, vol. 28, no. 1, pp. 52-61, 2019, doi: 10.1049/cje.2018.10.002 |
K. Yang, X.H. Jia, K. Ren, et al., "DAC-MACS:Effective data access control for multi-authority cloud storage systems", INFOCOM, Turin, Italy, pp.2895-2903, 2013.
|
X. Dong, J.D. Yu, Y. Luo, et al., "Achieving an effective, scalable and privacy-preserving data sharing service in cloud computing", Computers & Security, Vol.42, No.5, pp.151-164, 2014.
|
Q. Huang, Z. Ma, Y. Yang, et al., "EABDS:Attributebased secure data sharing with efficient revocation in cloud computing", Chinese Journal of Electronics, Vol.24, No.4, pp.862-868, 2015.
|
J. Hur and K. Kang, "Secure data retrieval for decentralized disruption-tolerant military networks", IEEE/ACM Transactions on Networking, Vol.22, No.1, pp.16-26, 2014.
|
Y. Chen, L. Song and G. Yang, "Attribute-based access control for multi-authority systems with constant size ciphertext in cloud computing", China Communications, Vol.13, No.2, pp.146-162, 2016.
|
Q. Zhao, Y. Zhang, G. Zhang et al., "Ciphertext-policy attribute based encryption supporting any monotone access structures without escrow", Chinese Journal of Electronics, Vol.26, No.3, pp.640-646, 2017.
|
S. Mang, F. Li, G. Shi, et al., "A user-centric data secure creation scheme in cloud computing", Chinese Journal of Electronics, Vol.25, No.4, pp.753-760, 2016.
|
Y. Chen, L. Song and G. Yang, "Attribute-based access control for multi-authority systems with constant size ciphertext in cloud computing", China Communications, Vol.13, No.2, pp.146-162, 2016.
|
J. Li, W. Yao, Y. Zhang, et al., "Flexible and fine-grained attribute-based data storage in cloud computing", IEEE Transactions on Services Computing, Published Online, 2017.
|
K. Yang, Z. Liu, X.H. Jia, et al., "Time-domain attributebased access control for cloud-based video", content sharing:A cryptographic approach", IEEE Transactions on Multimedia, Vol.18, No.5, pp.940-950, 2016.
|
J. Li, W. Yao, J. Han, et al., "User collusion avoidance CPABE with efficient attribute revocation for cloud storage", IEEE Systems Journal, Published Online, 2017.
|
J.K. Resch and J.S. Plank, "AONT-RS:Blending security and performance in dispersed storage", systems, FAST-2011:9th Usenix Conference on File and Storage Technologies, USENIX, pp.191-202, 2012.
|
J. Bethencourt, A. Sahai and B. Waters, "Ciphertext-policy attribute-based encryption", IEEE Symposium on Security and Privacy, Berkeley, CA, United states, pp.321-334, 2007.
|
Y. Zhu, H. Hu, G.-J. Ahn, et al., "Comparison-based encryption for fine-grained access control in clouds", 2th ACM conference on Data and Application Security and Privacy, Texas, USA, pp.105-116, 2012.
|