1. Liu Xueyan, Research on data access control method based on attribute encryption (Lanzhou University of Technology, 2016).
http://kns.cnki.net/kns/detail/detail.aspx?FileName=1017802099.nh&DbName=CDFD2017
2. W Jianfeng, Research on fuzzy searchable encryption scheme in cloud computing (Xi'an University of electronic science and technology, 2013),
http://kns.cnki.net/kns/detail/detail.aspx?FileName=1013304858.nh&DbName=CMFD2013
3. Z Jiashun, Z Yongxie, G Yan, Research on ABAC model based on usage control in cloud environment. Comput Appl Res 31(12), 3692–3694+3699 (2014)
4. S Jin-shu, II Apao, Wang, Yipin S, H Qiaolin, Attribute base encryption mechanism. Software J. 6, (2011)
5. F Anmin, S Jianye, S Ying, L Yu, The client-side security scheme for ciphertext data in cloud storage. Electronics 45(12), 2863–2872 (2017)