咨询与建议

限定检索结果

文献类型

  • 15 篇 期刊文献
  • 1 篇 会议

馆藏范围

  • 16 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 15 篇 工学
    • 11 篇 计算机科学与技术...
    • 6 篇 网络空间安全
    • 5 篇 电气工程
    • 5 篇 电子科学与技术(可...
    • 4 篇 信息与通信工程
    • 4 篇 软件工程
    • 2 篇 控制科学与工程
    • 1 篇 材料科学与工程(可...
    • 1 篇 生物医学工程(可授...
  • 4 篇 理学
    • 4 篇 数学
  • 1 篇 医学
    • 1 篇 临床医学
  • 1 篇 管理学
    • 1 篇 图书情报与档案管...

主题

  • 16 篇 revocation
  • 4 篇 cryptography
  • 3 篇 user
  • 3 篇 access
  • 3 篇 control
  • 3 篇 privacy
  • 2 篇 storage
  • 2 篇 generic
  • 2 篇 authentication
  • 2 篇 cloud
  • 2 篇 attribute-based
  • 2 篇 fine-grained
  • 2 篇 encryption
  • 2 篇 cloud computing
  • 2 篇 provable securit...
  • 1 篇 proxy
  • 1 篇 dual encryption
  • 1 篇 民事证据规定
  • 1 篇 traitor
  • 1 篇 data integrity

机构

  • 2 篇 independent scho...
  • 1 篇 institute of nin...
  • 1 篇 department of co...
  • 1 篇 school of comput...
  • 1 篇 department of co...
  • 1 篇 tianjin key labo...
  • 1 篇 national univers...
  • 1 篇 department of co...
  • 1 篇 school of comput...
  • 1 篇 institute of com...
  • 1 篇 institute of nin...
  • 1 篇 school of comput...
  • 1 篇 department of co...
  • 1 篇 school of electr...
  • 1 篇 department of co...
  • 1 篇 department of co...
  • 1 篇 school of comput...
  • 1 篇 college of intel...
  • 1 篇 beijing key labo...
  • 1 篇 school of mathem...

作者

  • 2 篇 genlang chen
  • 2 篇 zhiqian xu
  • 2 篇 hai jiang
  • 1 篇 朱岩
  • 1 篇 jia-jian zhang
  • 1 篇 sung-ming yen
  • 1 篇 xiaobiao li qiao...
  • 1 篇 chen e
  • 1 篇 wang yijing
  • 1 篇 yao junping
  • 1 篇 song lingwei
  • 1 篇 董晓蕾
  • 1 篇 胡宏新
  • 1 篇 ahmed barnawi
  • 1 篇 francisco martín...
  • 1 篇 niu xinxin
  • 1 篇 dawei li
  • 1 篇 peng weiping
  • 1 篇 zongyang zhang
  • 1 篇 tsung-min kuo

语言

  • 15 篇 英文
  • 1 篇 中文
检索条件"主题词=revocation"
16 条 记 录,以下是1-10 订阅
排序:
Enhanced secure medical data sharing with traceable and direct revocation
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2023年 第1期30卷 66-79页
作者: Peng Weiping Cui Shuang Song Cheng Han Ning School of Computer Science and Technology Henan Polytechnic UniversityJiaozuo 454003China
Sharing of the electronic medical records among different hospitals raises serious concern of the leakage of individual privacy for the adoption of the semi trustworthiness of the medical cloud platform.The tracking a... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Generic attribute revocation systems for attribute-based encryption in cloud storage
收藏 引用
Frontiers of Information Technology & Electronic Engineering 2019年 第6期20卷 773-786页
作者: Genlang CHEN Zhiqian XU Jia-jian ZHANG Guo-jun WANG Hai JIANG Miao-qing HUANG Institute of Ningbo Technology Zhejiang University Ningbo 315100 China Ningbo Research Institute Zhejiang University Ningbo 315100 China Independent Scholar School of Computer Science and Technology Guangzhou University Guangzhou 510006 China Department of Computer Science Arkansas State University Jonesboro 72467 USA Department of Computer Science and Computer Engineering University of Arkansas Jonesboro 72467 USA
Attribute-based encryption(ABE) has been a preferred encryption technology to solve the problems of data protection and access control, especially when the cloud storage is provided by third-party service providers.AB... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
An Efficient Broadcast Encryption Supporting Designation and revocation Mechanisms
收藏 引用
Chinese Journal of Electronics 2019年 第3期28卷 445-456页
作者: ZHU Yan YU Ruyun CHEN E HUANG Dijiang School of Computer and Communication Engineering University of Science and Technology Beijing School of Computing Informatics and Decision System Engineering Arizona State University
In this paper our objective is to explore approaches of secure group-oriented communication with designation and revocation mechanisms simultaneously.We present a new scheme of revocation-based broadcast encryption(RB... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Generic user revocation systems for attribute-based encryption in cloud storage
收藏 引用
Frontiers of Information Technology & Electronic Engineering 2018年 第11期19卷 1362-1384页
作者: Genlang CHEN Zhiqian XU Hai JIANG Kuan-ching LI Institute of Ningbo Technology Zhejiang University Independent Scholar Department of Computer Science Arkansas State University Department of Computer Science and Information Engineering Providence University
Cloud-based storage is a service model for businesses and individual users that involves paid or free storage resources. This service model enables on-demand storage capacity and management to users anywhere via the I... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Method of secure, scalable, and fine-grained data access control with efficient revocation in untrusted cloud
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2015年 第2期22卷 38-43页
作者: Song Lingwei Yu Fang Zhang Ru Niu Xinxin Information Security Center Beijing University of Posts and Telecommunications
Cloud computing is a developing computing paradigm in which resources of the computing infrastructure are provided as services over the network. Hopeful as it is, this paradigm also brings new challenges for data secu... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Provably Secure Role-Based Encryption with revocation Mechanism
收藏 引用
Journal of Computer Science & Technology 2011年 第4期26卷 697-710页
作者: 朱岩 胡宏新 Gail-Joon Ahn 王怀习 王善标 Institute of Computer Science and Technology Peking University Beijing Key Laboratory of Internet Security Technology Peking University School of Computing Informatics and Decision Systems EngineeringArizona State University School of Mathematical Sciences Peking University
Role-Based Encryption (RBE) realizes access control mechanisms over encrypted data according to the widely adopted hierarchical RBAC model. In this paper, we present a practical RBE scheme with revocation mechanism ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A revocation SCHEME FOR THE CLOUD COMPUTING ENVIRONMENT
A REVOCATION SCHEME FOR THE CLOUD COMPUTING ENVIRONMENT
收藏 引用
2011 IEEE International Conference on Cloud Computing and Intelligence Systems(CCIS2011)
作者: Xiaobiao Li,Qiaoyan Wen State Key Laboratory of Networking and Switching Technology,Beijing University of Posts and Telecommunications,Beijing,China
In order to meet the authentication requirement of the revoking frequently and dynamic network environment,a revocation scheme for the cloud computing environment is proposed.The entering,leaving,revoking and authenti... 详细信息
来源: cnki会议 评论
Attribute-Based Secure Data Sharing with Efficient revocation in Fog Computing
收藏 引用
Journal of Information Security 2017年 第3期8卷 203-222页
作者: Asma Alotaibi Ahmed Barnawi Mohammed Buhari Department of Information Technology King Abdulaziz University Jeddah Saudi Arabia
Fog computing is a concept that extends the paradigm of cloud computing to the network edge. The goal of fog computing is to situate resources in the vicinity of end users. As with cloud computing, fog computing provi... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Tree-Based revocation for Certificateless Authentication in Vehicular Ad-Hoc Networks
收藏 引用
Journal of Computer and Communications 2014年 第9期2卷 14-21页
作者: Pino Caballero-Gil Francisco Martín-Fernández Cándido Caballero-Gil Department of Computer Science University of La Laguna Tenerife Spain
This work proposes authentication based on identity as a way to increase the efficiency and security of communications in vehicular ad-hoc networks. When using identity-based cryptography to achieve certificateless au... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Revocable Hierarchical Identity-Based Broadcast Encryption
收藏 引用
Tsinghua Science and Technology 2018年 第5期23卷 539-549页
作者: Dawei Li Jianwei Liu Zongyang Zhang Qianhong Wu Weiran Liu School of Electronic and Information Engineering Beihang University Beijing 100191 China
Hierarchical Identity-Based Broadcast Encryption (HIBBE) organizes users into a tree-like structure, and it allows users to delegate their decryption ability to subordinates and enable encryption to any subset of us... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论