共 8 条
[1]
Enforcing dynamic write privileges in data outsourcing[J] . Sabrina De Capitani di Vimercati,Sara Foresti,Sushil Jajodia,Giovanni Livraga,Stefano Paraboschi,Pierangela Samarati.Computers & Security . 2013
[2]
Time-based proxy re-encryption scheme for secure data sharing in a cloud environment[J] . Qin Liu,Guojun Wang,Jie Wu.Information Sciences . 2012
[3]
Encryption Policies for Regulating Access to Outsourced Data
[J].
ACM TRANSACTIONS ON DATABASE SYSTEMS,
2010, 35 (02)
[4]
Managing key hierarchies for access control enforcement: Heuristic approaches[J] . Carlo Blundo,Stelvio Cimato,Sabrina De Capitani di Vimercati,Alfredo De Santis,Sara Foresti,Stefano Paraboschi,Pierangela Samarati.Computers & Security . 2009 (5)
[5]
Improved proxy re-encryption schemes with applications to secure distributed storage[J] . Giuseppe Ateniese,Kevin Fu,Matthew Green,Susan Hohenberger.ACM Transactions on Information and System Security (TISSEC) . 2006 (1)
[6]
http://yun.baidu.com/?ref=ppzq .
[7]
Attribute-Based encryption for fine-grained access control of encrypted data. Goyal V,Pandey O,Sahai A,Waters B. Proc.ofthe 13th ACM Conf.on Computer and Communications Security . 2006
[8]
http://aws.amazon.com/cn/s3 .