Author:
Bouchaala Mariem,Ghazel Cherif,Saidane Leila Azouz
Publisher
Springer International Publishing
Reference14 articles.
1. Bouchaala, M., Ghazel, C., Saidane, L.A.: End to end cloud computing architecture based on a novel classification of security issues. In: IEEE on International Conference on Computer Systems and Applications (AICCSA), March 2018
2. Matthew, G., Susan, H., Brent, W.: Outsourcing the decryption of ABE ciphertexts. In: Proceeding SEC 11 Proceedings of the 20th USENIX Conference on Security, pp. 34–34, August 2011
3. John, B., Amit, S., Brent, W.: Ciphertext-policy attribute-based encryption. In: Proceedings of the 2007 IEEE on Symposium on Security and Privacy, SP 2007, pp. 321–334, May 2007
4. Bouchaala, M., Ghazel, C., Saidane, L.A.: Revocable sliced ciphertext policy attribute based encryption scheme in cloud computing. In: 15th International Wireless Communications Mobile Computing Conference (IWCMC), June 2019
5. Zhiguo, W., June, L., Robert, H.D.: HASBE: a hierarchical attribute-based solution for flexible and scalable access control in cloud computing. IEEE Trans. Inf. Forensics Secur. 7(2), 743–754 (2012)
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献