[1] YU S, WANG C, REN K, et al. Achieving secure, scalable and fine-grained data access control in cloud computing [C]// INFOCOM'10: Proceedings of the 29th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies. Piscataway: IEEE, 2010: 534-542. [2] LIANG X, CAO Z, LIN H, et al. Attribute based proxy re-encryption with delegating capabilities [C]// Proceedings of the 4th International Symposium on Information, Computer, and Communications Security. New York: ACM, 2009: 276-286. [3] SUN G, DONG Y, LI Y. CP-ABE based data access control for cloud storage [J]. Journal on Communications, 2011, 32(7): 146-152.(孙国梓,董宇,李云.基于CP-ABE算法的云存储数据访问控制[J].通信学报,2011,32(7):146-152.) [4] WANG T, ZENG Q. Research on permission revocation in dynamic security policies [J]. Journal of Computer Applications, 2009, 29(7): 1808-1812.(王涛,曾庆凯.动态安全策略的权限撤销研究[J].计算机应用,2009,29(7):1808-1812.) [5] TIAN X, WANG X, ZHOU A. DSP re-encryption based access control enforcement management mechanism in DaaS [J]. International Journal of Network Security, 2013, 15(1): 28-41. [6] HONG C, ZHANG M, FENG D. AB-ACCS: a cryptographic access control method in cloud storage [J]. Journal of Computer Research and Development, 2010, 47(Z1): 259-265.(洪澄,张敏,冯登国.AB-ACCS:一种云存储密文访问控制方法[J].计算机研究与发展,2010,47(Z1):259-265.) [7] YU S, WANG C, REN K, et al. Attribute based data sharing with attribute revocation [C]// Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security. New York: ACM, 2010: 261-270. [8] JAHID S, MITTAL P, BORISOV N. Easier: encryption-based access control in social networks with efficient revocation [C]// Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security. New York: ACM, 2011: 411-415. [9] XU Z, MARTIN K M. Dynamic user revocation and key refreshing for attribute based encryption in cloud storage [C]// TrustCom 2012: Proceedings of the 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications. Piscataway: IEEE, 2012: 844-849. [10] LIBERT B, VERGNAUD D. Unidirectional chosen-ciphertext se-cure proxy re-encryption [J]. IEEE Transactions on Information Theory, 2011, 57(3): 1786-1802. [11] CHENG Y. Research on key techniques of improving the usability of cryptographic access control in cloud storage [D]. Changsha: National University of Defense Technology, 2013.(程勇.云存储中密文访问控制机制性能优化关键技术研究[D].长沙:国防科学技术大学,2013.) [12] STEFANOV E, SHI E. Multi-cloud oblivious storage [C]// Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security. New York: ACM, 2013: 247-258. [13] de CAPITANI di VIMERCATI S, FORESTI S, JAJODIA S, et al. Encryption-based policy enforcement for cloud storage [C]// ICDCSW’10: Proceedings of the 2010 IEEE 30th International Conference on Distributed Computing Systems Workshops. Piscataway: IEEE, 2010: 42-51. [14] ZHANG H, ZHAO L, FENG B, et al. CACDP: a cryptographic access control for dynamic policy in cloud storage [J]. Journal of Computer Research and Development, 2014, 51(7): 1424-1435.(张浩,赵磊,冯博,等.CACDP:适用于云存储动态策略的密文访问控制方法[J].计算机研究与发展,2014,51(7):1424-1435.) [15] KUMBHARE A G, SIMMHAN Y, PRASANNA V. Designing a secure storage repository for sharing scientific datasets using public clouds [C]// Proceedings of the Second International Workshop on Data Intensive Computing in the Clouds. New York: ACM, 2011: 31-40. |