4.6 Article

Match in My Way: Fine-Grained Bilateral Access Control for Secure Cloud-Fog Computing

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Information Systems

Lightweight and Expressive Fine-Grained Access Control for Healthcare Internet-of-Things

Shengmin Xu et al.

Summary: Healthcare Internet-of-Things (IoT) is a new paradigm that connects embedded devices to the cloud for monitoring patient vital signals and data aggregation. However, there are security concerns with the cloud due to untrusted network environments and limited resources. To address this, this paper proposes a novel healthcare IoT system that combines attribute-based encryption, cloud and edge computing to provide efficient, flexible, secure fine-grained access control and data verification, without the need for a secure channel.

IEEE TRANSACTIONS ON CLOUD COMPUTING (2022)

Article Computer Science, Theory & Methods

Passive Attacks Against Searchable Encryption

Jianting Ning et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2019)

Article Computer Science, Information Systems

Revocable attribute-based encryption with decryption key exposure resistance and ciphertext delegation

Shengmin Xu et al.

INFORMATION SCIENCES (2019)

Proceedings Paper Computer Science, Information Systems

Match Me if You Can: Matchmaking Encryption and Its Applications

Giuseppe Ateniese et al.

ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT II (2019)

Article Computer Science, Theory & Methods

Auditable σ-Time Outsourced Attribute-Based Encryption for Access Control in Cloud Computing

Jianting Ning et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2018)

Article Computer Science, Theory & Methods

Secure Fine-Grained Access Control and Data Sharing for Dynamic Groups in the Cloud

Shengmin Xu et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2018)

Article Computer Science, Information Systems

Hidden policy ciphertext-policy attribute-based encryption with keyword search against keyword guessing attack

Shuo Qiu et al.

SCIENCE CHINA-INFORMATION SCIENCES (2017)

Proceedings Paper Computer Science, Theory & Methods

Access Control Encryption for General Policies from Standard Assumptions

Sam Kim et al.

ADVANCES IN CRYPTOLOGY - ASIACRYPT 2017, PT I (2017)

Proceedings Paper Computer Science, Information Systems

FAME: Fast Attribute-based Message Encryption

Shashank Agrawal et al.

CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2017)

Article Computer Science, Information Systems

Efficient attribute-based data sharing in mobile clouds

Yinghui Zhang et al.

PERVASIVE AND MOBILE COMPUTING (2016)

Proceedings Paper Computer Science, Information Systems

Access Control Encryption: Enforcing Information Flow with Cryptography

Ivan Damgard et al.

THEORY OF CRYPTOGRAPHY, TCC 2016-B, PT II (2016)

Article Computer Science, Theory & Methods

HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing

Zhiguo Wan et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2012)

Proceedings Paper Computer Science, Information Systems

Ciphertext-policy attribute-based encryption

John Bethencourt et al.

2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS (2007)