Fine-grained access control system based on outsourced attribute-based encryption

J Li, X Chen, J Li, C Jia, J Ma, W Lou - … Egham, UK, September 9-13, 2013 …, 2013 - Springer
As cloud computing becomes prevalent, more and more sensitive data is being centralized
into the cloud for sharing, which brings forth new challenges for outsourced data security …

[引用][C] Fine‐grained access control system based on outsourced attribute‐based encryption

J Li - Computer Security (ESORICS'13), LNCS, 2013 - cir.nii.ac.jp
Fine‐grained access control system based on outsourced attribute‐based encryption | CiNii
Research CiNii 国立情報学研究所 学術情報ナビゲータ[サイニィ] 詳細へ移動 検索フォームへ移動 …

[PDF][PDF] Fine-Grained Access Control System Based on Outsourced Attribute-Based Encryption

J Li, X Chen, J Li, C Jia, J Ma, W Lou - researchgate.net
As cloud computing becomes prevalent, more and more sensitive data is being centralized
into the cloud for sharing, which brings forth new challenges for outsourced data security …

Fine-Grained Access Control System Based on Outsourced Attribute-Based Encryption

J Li, X Chen, J Li, C Jia, J Ma, W Lou - Computer Security–ESORICS 2013 - Springer
As cloud computing becomes prevalent, more and more sensitive data is being centralized
into the cloud for sharing, which brings forth new challenges for outsourced data security …

[PDF][PDF] Fine-Grained Access Control System based on Outsourced Attribute-based Encryption

J Li, X Chen, J Li, C Jia, J Ma, W Lou - cnsr.ictas.vt.edu
As cloud computing becomes prevalent, more and more sensitive data is being centralized
into the cloud for sharing, which brings forth new challenges for outsourced data security …

[PDF][PDF] Fine-Grained Access Control System based on Outsourced Attribute-based Encryption

J Li, X Chen, J Li, C Jia, J Ma, W Lou - Citeseer
As cloud computing becomes prevalent, more and more sensitive data is being centralized
into the cloud for sharing, which brings forth new challenges for outsourced data security …

[PDF][PDF] Fine-Grained Access Control System Based on Outsourced Attribute-Based Encryption

J Li, X Chen, J Li, C Jia, J Ma, W Lou - researchgate.net
As cloud computing becomes prevalent, more and more sensitive data is being centralized
into the cloud for sharing, which brings forth new challenges for outsourced data security …