Author:
Merdassi Imen,Ghazel Cherif,Saidane Leila
Publisher
Springer Science and Business Media LLC
Subject
Hardware and Architecture,Information Systems,Theoretical Computer Science,Software
Reference30 articles.
1. Lecture Notes in Computer Science (LNCS);I Merdassi,2019
2. Yang K, Jia X, Ren K (2015) Secure and verifiable policy update outsourcing for big data access control in the cloud. IEEE Trans Parallel Distrib Syst 26:3461–3470
3. Sahai A, Waters B (2005) Fuzzy identity-based encryption. Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, Berlin Heidelberg, pp 457–473
4. Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, Alexandria Virginia USA, pp 89–98
5. Chase M (2007) Multi-authority attribute based encryption. Theory of cryptography conference. Springer, Berlin Heidelberg, pp 515–534
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Location and Time Based Access Security Control Scheme for Mobile Cloud Computing;2023 12th IFIP/IEEE International Conference on Performance Evaluation and Modeling in Wired and Wireless Networks (PEMWN);2023-09-27