Author:
Ezhil Arasi V.,Indra Gandhi K.,Kulothungan K.
Publisher
Springer Science and Business Media LLC
Subject
Hardware and Architecture,Information Systems,Theoretical Computer Science,Software
Reference39 articles.
1. Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. In: 2007 IEEE symposium on security and privacy (SP'07). IEEE, pp 321–334
2. Hur J (2011) Improving security and efficiency in attribute-based data sharing. IEEE Trans Knowl Data Eng 25(10):2271–2282
3. Wei J, Liu W, Xuexian Hu (2016) Secure and efficient attribute-based access control for multiauthority cloud storage. IEEE Syst J 12(2):1731–1742
4. Fan K, Tian Q, Wang J, Li H, Yang Y (2017) Privacy protection based access control scheme in cloud-based services. China Commun 14(1):61–71
5. Pawar P, Sheikh R (2016) Implementation of secure authentication scheme and access control in cloud computing. Proc Int Conf ICT Bus Ind Gov 55:43–45
Cited by
23 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献