[1] |
WANG Y D, YANG J H, XU C, et al. Survey on accesscontrol technologies for cloud computing [J]. Journalof Software, 2015, 26(5): 1129-1150 (in Chinese).
|
[2] |
JHA S, SURAL S, VAIDYA J, et al. Security analysisof temporal RBAC under an administrative model [J].Computers & Security, 2014, 46: 154-172.
|
[3] |
YANG L, TANG Z, LI R F, et al. Roles query algorithmin cloud computing environment based on userrequire [J]. Journal of Communications, 2010, 7(32):169-175 (in Chinese).
|
[4] |
LUO J,WANG H J, GONG X, et al. A novel role-basedaccess control model in cloud environments [J]. InternationalJournal of Computational Intelligence Systems,2016, 9(1): 1-9.
|
[5] |
LI J W, SQUICCIARINI A, LIN D, et al. SecLoc:Securing location-sensitive storage in the cloud[C]//Proceedings of the 20th ACM Symposium on AccessControl Models and Technologies. Vienna, Austria:ACM, 2015: 51-61.
|
[6] |
ZHOU L, VARADHARAJAN V, HITCHENS M.Trust enhanced cryptographic role-based access controlfor secure cloud data storage [J]. IEEE Transactionson Information Forensics and Security, 2015,10(11): 2381-2395.
|
[7] |
ZHOU L, VARADHARAJAN V, GOPINATH K. Asecure role-based cloud storage system for encryptedpatient-centric health records [J]. The Computer Journal,2016, 59(11): 1593-1611.
|
[8] |
XU P, JIAO T F, WU Q H, et al. Conditional identitybasedbroadcast proxy re-encryption and its applicationto cloud email [J]. IEEE Transactions on Computers,2016, 65(1): 66-79.
|
[9] |
ZHANG Y H, LI J, CHEN X F, et al. Anonymousattribute based proxy re-encryption for access controlin cloud computing [J]. Security and CommunicationNetworks, 2016, 9(14): 2397-2411.
|
[10] |
LI J G, ZHAO X X, ZHANG Y C, et al. Provably securecertificate-based conditional proxy re-encryption[J]. Journal of Information Science and Engineering,2016, 32(4): 813-830.
|
[11] |
LIU Q, WANG G J, WU J. Time-based proxy reencryptionscheme for secure data sharing in a cloudenvironment [J]. Information Sciences, 2014, 258(3):355-370.
|
[12] |
YANG Y J, LU H B,WENG J, et al. Fine-grained conditionalproxy re-encryption and application [J]. LectureNotes in Computer Science, 2014, 8782: 206-222.
|
[13] |
TANG Q. Type-based proxy re-encryption and its construction[J]. Lecture Notes in Computer Science, 2008,5365: 130-144.
|
[14] |
SU M, SHI G Z, XIE R N, et al. Multi-element basedon proxy re-encryption scheme for mobile cloud computing[J]. Journal of Communications, 2015, 36(11):73-79 (in Chinese).
|
[15] |
SU M, LI F H, SHI G Z, et al. A user-centric datasecure creation scheme in cloud computing [J]. ChineseJournal of Electronics, 2016, 25(4): 753-760.
|