[1] 王于丁,杨家海,等.云计算访问控制研究综述[J].软件学报,2015,26(5):1129-1150. Wang YD,Yang JH,et al.Survey on access control technologies for cloud computing[J].Journal of Software,2015,26(5):1129-1150.(in Chinese)
[2] 冯朝胜,秦志光,等.云计算环境下访问控制关键技术[J].电子学报,2015.42(2):3125-319. Feng C,Qin Z,et al.Key techniques access control for cloud computing[J].Acta Electronica Sinica,2015,42(2):312-319.(in Chinese)
[3] Sahai A,Waters B.Fuzzy identity-based encryption[A].Advances in Cryptology-EUROCRYPT 2005[C].Berlin,Heidelberg:Springer-Verlag,2005.457-473.
[4] Bethencourt J,Sahai A,Waters B.Ciphertext-policy attribute-based encryption[A].Proc of the 2007 IEEE Symp on Security and Privacy[C].Washington:IEEE Computer Society,2007.321-334.
[5] 李凤华,苏芒,史国振,马建峰.访问控制模型研究进展及发展趋势[J].电子学报,2012,40(4):805-813. Li FH,Su M,Shi GZ,Ma JF.Research status and development trends of access control model[J].Acta Electronica Sinica,2012,40(4):805-813.(in Chinese)
[6] 俞能海,郝卓,等.云安全研究进展综述[J].电子学报,2013,41(2):371-381. Yu NH,Hao Z,et al.Review of cloud computing security[J].Acta Electronica Sinica,2013,41(2):371-381.(in Chinese)
[7] Goyal V,Jain A,Pandey O,Sahai A.Bounded ciphertext policy attribute based encryption[A].Proc of the ICALP 2008[C].Berlin,Heidelberg:Springer-Verlag,2008.579-591.
[8] Liang XH,Cao ZF,Lin H,Xing DS.Provably secure and efficient bounded ciphertext policy attribute based encryption[A].Proc of the ASIAN ACM Symp on Information,Computer and Communications Security (ASIACCS 2009)[C].New York:ACM Press,2009.343-352.
[9] Liu X,Ma J,Xiong J,et al.Ciphertext-policy hierarchical attribute-based encryption for fine-grained access control of encryption Data[J].International Journal of Network Security,2014,16(4):351-357.
[10] Wan Z,Liu J,Deng RH.HASBE:a hierarchical attribute-based solution for flexible and scalable access control in cloud computing[J].Information Forensics and Security,IEEE Transactions,2012,7(2):743-754.
[11] Kan Y,Xiaohua J,Kui R,Bo Z.DAC-MACS:Effective data access control for multi-authority cloud storage systems[A].2013 Proceedings IEEE INFOCOM[C].Turn,Italy:IEEE,2013.2895-2903.
[12] Jianwei C,Huadong M.Efficient decentralized attribute-based access control for cloud storage with user revocation[A].IEEE ICC 2014[C].Sydney:IEEE,2014.3782-3787.
[13] Sushmita R,Amiya.N,Ivan.S,DACC:Distributed access control in clouds[A].IEEE Trust Com'11[C].Changsha:IEEE,2011.91-98.
[14] Attrapadung N,Imai H.Attribute-Based encryption supporting direct/indirect revocation modes[A].Proc of the Cryptography and Coding 2009[C].Berlin,Heidelberg:Springer-Verlag,2009.278-300.
[15] Yu SC,Wang C,Ren K,Lou WJ.Attribute based data sharing with attribute revocation[A].Proc of the ASIAN ACM Conf.on Computer and Communications Security (ASIACCS 2010)[C].New York:ACM Press,2010.261-270.
[16] 洪澄,江敏,冯登国.AB-ACCS:一种云存储密文访问控制方法[J].计算机研究与发展,2010,47:259-265. Hong C,Zhang M,Feng D.MAB-ACCS:A cryptographic access control scheme for cloud storage[J].Journal of Computer Research and Development,2010,47:259-265.(in Chinese)
[17] Boneh D,Goh E,Nissim K.Evaluating 2-DNF formulas on ciphertexts[A].Proc of the Theory of Cryptography (TCC2005)[C].Berlin:Springer-Verlag,2005.325-341.
[18] Dan B,Matthew KF.Identity-based encryption from the weil pairing[A].Advances in Cryptology-CRYPTO 2011[C].Santa Barbara,USA:Springer,2001.213-229.
[19] Beimel A.Secure schemes for secret sharing and key distribution[D].Haifa:Israel Institute of Technology,1996.
[20] Taeho J,XiangYang L,Zhiguo W,Meng W.Privacy preserving cloud data access with multi-authorities[A].2013 Proceedings IEEE INFOCOM[C].Turn,Italy:IEEE,2013.2625-2633. |