4.6 Article

Blockchain-Based Digital Rights Management Scheme via Multiauthority Ciphertext-Policy Attribute-Based Encryption and Proxy Re-Encryption

Related references

Note: Only part of the references are listed.
Proceedings Paper Automation & Control Systems

Research on Digital Copyright Management System Based on Blockchain Technology

Xuewang Zhang et al.

PROCEEDINGS OF 2019 IEEE 3RD INFORMATION TECHNOLOGY, NETWORKING, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (ITNEC 2019) (2019)

Proceedings Paper Computer Science, Artificial Intelligence

Smart-AC: A New Framework Concept for Modeling Access Control Policy

Nadine Kashmar et al.

16TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS AND PERVASIVE COMPUTING (MOBISPC 2019),THE 14TH INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND COMMUNICATIONS (FNC-2019),THE 9TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY (2019)

Article Computer Science, Artificial Intelligence

Multi-authority attribute-based encryption access control scheme with policy hidden for cloud storage

Hong Zhong et al.

SOFT COMPUTING (2018)

Article Computer Science, Hardware & Architecture

Multi-authority fine-grained access control with accountability and its application in cloud

Jin Li et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2018)

Article Computer Science, Information Systems

Security and Privacy in Smart Health: Efficient Policy-Hiding Attribute-Based Access Control

Yinghui Zhang et al.

IEEE INTERNET OF THINGS JOURNAL (2018)

Article Engineering, Electrical & Electronic

Secure DRM Scheme Based on Blockchain with High Credibility

Ma Zhaofeng et al.

CHINESE JOURNAL OF ELECTRONICS (2018)

Article Computer Science, Information Systems

Efficient and Secure Access Control Scheme in the Standard Model for Vehicular Cloud Computing

Wei Luo et al.

IEEE ACCESS (2018)

Article Engineering, Multidisciplinary

Modified Ciphertext-Policy Attribute-Based Encryption Scheme with Efficient Revocation for PHR System

Hongying Zheng et al.

MATHEMATICAL PROBLEMS IN ENGINEERING (2017)

Article Computer Science, Information Systems

Two-Factor Data Access Control With Efficient Revocation for Multi-Authority Cloud Storage Systems

Xiaoyu Li et al.

IEEE ACCESS (2017)

Proceedings Paper Computer Science, Information Systems

Efficient, Verifiable and Privacy Preserving Decentralized Attribute-Based Encryption for Mobile Cloud Computing

Maoxu Lyu et al.

2017 IEEE SECOND INTERNATIONAL CONFERENCE ON DATA SCIENCE IN CYBERSPACE (DSC) (2017)

Proceedings Paper Computer Science, Artificial Intelligence

A Novel Digital Rights Management Mechanism on Peer-to-Peer Streaming System

Jin Zhang et al.

ADVANCES IN INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, VOL 1 (2017)

Article Computer Science, Theory & Methods

Current Research and Open Problems in Attribute-Based Access Control

Daniel Servos et al.

ACM COMPUTING SURVEYS (2017)

Review Computer Science, Hardware & Architecture

Access control in the Internet of Things: Big challenges and new opportunities

Aafaf Ouaddah et al.

COMPUTER NETWORKS (2017)

Proceedings Paper Computer Science, Artificial Intelligence

Towards a Novel Privacy-Preserving Access Control Model Based on Blockchain Technology in IoT

Aafaf Ouaddah et al.

EUROPE AND MENA COOPERATION ADVANCES IN INFORMATION AND COMMUNICATION TECHNOLOGIES (2017)

Article Computer Science, Information Systems

Secure, efficient and revocable multi-authority access control system in cloud storage

Qi Li et al.

COMPUTERS & SECURITY (2016)

Article Computer Science, Information Systems

Anonymous attribute-based proxy re-encryption for access control in cloud computing

Yinghui Zhang et al.

SECURITY AND COMMUNICATION NETWORKS (2016)

Article Computer Science, Theory & Methods

Access control and the Resource Description Framework: A survey

Sabrina Kirrane et al.

Semantic Web (2016)

Article Computer Science, Information Systems

Efficient and Adaptively Secure Attribute-Based Proxy Reencryption Scheme

Huixian Li et al.

INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS (2016)

Article Engineering, Electrical & Electronic

Digital rights management system with user privacy, usage transparency, and superdistribution support

Chih-Ta Yen et al.

INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS (2014)

Proceedings Paper Computer Science, Information Systems

Ciphertext-policy attribute-based encryption

John Bethencourt et al.

2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS (2007)