1 |
J. Li, A. Squicciarini, D. Lin, et al, "SecLoc: Securing Location-Sensitive Storage in the Cloud," in Proc. of SACMAT'15, pp.51-61, June. 2015.
|
2 |
L. Zhou, V. Varadharajan, M. Hitchens, "Trust Enhanced Cryptographic Role-Based Access Control for Secure Cloud Data Storage," IEEE Transactions on Information Forensics and Security, vol.10, no.11, pp. 2381-2395, Nov. 2015.
DOI
|
3 |
L. Zhou, V. Varadharajan, K. Gopinath, "A Secure Role-Based Cloud Storage System for Encrypted Patient-Centric Health Records," The Computer Journal, vol.59, no.11, pp. 1593-1611, July. 2016.
DOI
|
4 |
P. Xu, T Jiao, Q. Wu, et al, "Conditional Identity-Based Broadcast Proxy Re-Encryption And Its Application to Cloud Email," IEEE Transactions on Computers, vol.65, no.1, pp.66-79, Mar. 2015.
DOI
|
5 |
Y. Zhang, J. Li, X. Chen, et al, "Anonymous Attribute Based Proxy Re-Encryption for Access Control in Cloud Computing," Security and Communication Networks, vol. 9, no.14, pp.2397-2411, July. 2016.
DOI
|
6 |
J. Li, X. Zhao and Y. Zhang et al, "Provably Secure Certificate-based Conditional Proxy Re-encryption," Journal of Information Science & Engineering, vol.32, no.4, pp. 813-830, July. 2016.
|
7 |
Q. Liu, G. Wang, J. Wu, "Time-Based Proxy Re-Encryption Scheme for Secure Data Sharing in a Cloud Environment," Information Sciences, vol. 258, no.3, pp.355-370, Feb. 2014.
DOI
|
8 |
Y. Yang, H. Lu and J. Weng et al, "Fine-Grained Conditional Proxy Re-Encryption and Application," in Proc. of ProvSec 2014, pp. 206-222, Oct.2014.
|
9 |
Q. Tang, "Type-Based Proxy Re-encryption and Its Construction," Proc. INDOCRYPT 2008. Springer Berlin Heidelberg. pp. 130-144. 2008.
|
10 |
M. Su, G. Z. Shi Z, R. N. Xie, et al, "Multi-element based on proxy re-encryption scheme for mobile cloud computing," Journal of Communications, 36(11):73-79, 2015.
DOI
|
11 |
J. Luo, H. Wang and X. Gong, et al. "A Novel Role-Based Access Control Model in Cloud Environments," International Journal of Computational Intelligence Systems, vol.9, no.1, pp. 1-9, Feb. 2016.
DOI
|
12 |
M. Su, F. H. Li, G. Z. Shi, et al, "A User-Centric Data Secure Creation Scheme in Cloud Computing," Chinese Journal of Electronics, vol.25, no.4, pp. 753-760, April, 2016.
DOI
|
13 |
X. Jia, J. Shao, J. Jing, et al. "CCA-secure type-based proxy re-encryption with invisible proxy," in Proc. of Computer and Information Technology (CIT), 2010 IEEE 10th International Conference on. IEEE, 1299-1305, 2010.
|
14 |
Y. D. Wang, J. H. Yang, C. Xu, et al, "Survey on Access Control Technologies for Cloud Computing," Ruan Jian Xue Bao/ Journal of Software, vol.26, no. 5, pp. 1129-1150, May, 2015.
|
15 |
S. Jha, S. Sural and J. Vaidya et al, "Security Analysis of Temporal RBAC under an Administrative Model," Computers & Security, vol. 46, pp.154-172, Oct. 2014.
DOI
|
16 |
L. Yang, Z. Tang, R. F. Li, et al, "Roles query algorithm in cloud computing environment based on user require," Journal of Communications, vol.32, no.7, pp 169-175, July, 2010.
|