Time-controllable keyword search scheme with efficient revocation in mobile e-health cloud

Y Miao, F Li, X Li, Z Liu, J Ning, H Li… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
Electronic health (e-health) systems may outsource data such as patient e-health records to
mobile cloud servers for efficiency gains (eg, minimizing local storage and computation …

Attribute-based access control for ICN naming scheme

B Li, D Huang, Z Wang, Y Zhu - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Information Centric Networking (ICN) is a new network architecture that aims to overcome
the weakness of existing IPbased networking architecture. Instead of establishing a …

Towards temporal access control in cloud computing

Y Zhu, H Hu, GJ Ahn, D Huang… - 2012 Proceedings IEEE …, 2012 - ieeexplore.ieee.org
Access control is one of the most important security mechanisms in cloud computing.
Attribute-based access control provides a flexible approach that allows data owners to …

Privacy-aware efficient fine-grained data access control in Internet of medical things based fog computing

X Wang, L Wang, Y Li, K Gai - IEEE Access, 2018 - ieeexplore.ieee.org
The recent development of cloud computing has empowered the Internet-based services,
which enable users to gain a broad scope of access to their applications, such as Internet of …

Efficient attribute-based comparable data access control

Z Wang, D Huang, Y Zhu, B Li… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
With the proliferation of mobile devices in recent years, there is a growing concern regarding
secure data storage, secure computation, and fine-grained access control in data sharing for …

[图书][B] Mobile cloud computing: foundations and service models

D Huang, H Wu - 2017 - books.google.com
Mobile Cloud Computing: Foundations and Service Models combines cloud computing,
mobile computing and wireless networking to bring new computational resources for mobile …

Dynamic access policy in cloud-based personal health record (PHR) systems

X Liu, Q Liu, T Peng, J Wu - Information Sciences, 2017 - Elsevier
With the development of cloud computing, an increasing number of users are using cloud-
based personal health record (PHR) systems. The PHR is closely tied to patient privacy, and …

Privacy-preserving Boolean range query with temporal access control in mobile computing

Q Tong, X Li, Y Miao, X Liu, J Weng… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
With increasingly popular GPS-equipped mobile devices (eg, smartphones, tablets, laptops),
massive spatio-textual data has been outsourced to cloud servers for storage and analysis …

Achieving flexible and self-contained data protection in cloud computing

B Lang, J Wang, Y Liu - IEEE Access, 2017 - ieeexplore.ieee.org
For enterprise systems running on public clouds in which the servers are outside the control
domain of the enterprise, access control that was traditionally executed by reference …

Privacy preserving fine-grained location-based access control for mobile cloud

Y Baseri, A Hafid, S Cherkaoui - computers & security, 2018 - Elsevier
Mobile cloud computing is a revolutionary computing paradigm for mobile applications,
which enables storage and computation migration from mobile users to resource-rich and …