Journal of Engineering and Applied Sciences

Year: 2018
Volume: 13
Issue: 2 SI
Page No. 2986 - 2991

2-Factor Based Fine-Grained Access Control Scheme for 5G Environment

Authors : Yoon-Su Jeong and Jin-Hee Ku

References

Attrapadung, N. and H. Imai, 2009. Conjunctive Broadcast and Attribute-Based Encryption. In: Pairing-Based Cryptography-Pairing, Shacham, H. and W. Brent (Eds.). Springer, Berlin, Germany, ISBN:978-3-642-03297-4, pp: 248-265.

Bethencourt, J., A. Sahai and B. Waters, 2007. Ciphertext-policy attribute-based encryption. Proceedings of the IEEE International Symposium on Security and Privacy, May 20-23, 2007, IEEE, Berkeley, California, USA., pp: 321-334.

Chase, M., 2007. Multi-Authority Attribute Based Encryption. In: Theory of Cryptography, Vadhan, S.P. (Ed.). Springer, Berlin, Germany, ISBN:978-3-540-70935-0, pp: 515-534.

Chen, C., Z. Zhang and D. Feng, 2011. Efficient Ciphertext Policy Attribute-Based Encryption with Constant-Size Ciphertext and Constant Computation-Cost. In: Provable Security, Boyen, X. and C. Xiaofeng (Eds.). Springer, Berlin, Germany, ISBN:978-3-642-24315-8, pp: 84-101.

Cheung, L. and C. Newport, 2007. Provably secure ciphertext policy ABE. Proceedings of the 14th ACM Conference on Computer and Communications Security, October 28, 2007, ACM, New York, USA., ISBN:978-1-59593-703-2, pp: 456-465.

Emura, K., A. Miyaji, A. Nomura, K. Omote and M. Soshi, 2009. A Ciphertext-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length. In: Information Security Practice and Experience, Bao, F., L. Hui and W. Guilin (Eds.). Springer, Berlin, Germany, ISBN:978-3-642-00842-9, pp: 13-23.

Haller, S., S. Karnouskos and C. Schroth, 2008. The Internet of Things in an Enterprise Context. In: Future Internet, Domingue, J., D. Fensel and P. Traverso (Eds.). Springer, Berlin, Germany, ISBN:978-3-642-00984-6, pp: 14-28.

Herranz, J., F. Laguillaumie and C. Rafols, 2010. Constant Size Ciphertexts in Threshold Attribute-Based Encryption. In: Public Key Cryptography-PKC 2010, Nguyen, P.Q. and D. Pointcheval (Eds.). Springer, Berlin, Germany, ISBN:978-3-642-13012-0, pp: 19-34.

Hur, J. and D.K. Noh, 2011. Attribute-based access control with efficient revocation in data outsourcing systems. IEEE Trans. Parallel Distrib. Syst., 22: 1214-1221.
CrossRef  |  

Hur, J. and D.K. Noh, 2011. Attribute-based access control with efficient revocation in data outsourcing systems. IEEE Trans. Parallel Distrib. Syst., 22: 1214-1221.
CrossRef  |  

Lin, H., Z. Cao, X. Liang and J. Shao, 2010. Secure threshold multi authority attribute based encryption without a central authority. Inform. Sci., 180: 2618-2632.
CrossRef  |  

Liu, X., Y. Zhang, B. Wang and J. Yan, 2013. Mona: Secure multi-owner data sharing for dynamic groups in the cloud. IEEE Trans. Parallel Distrib. Syst., 24: 1182-1191.
CrossRef  |  Direct Link  |  

Rao, Y.S. and R. Dutta, 2013. Recipient Anonymous Ciphertext-Policy Attribute Based Encryption. In: Information Systems Security, Bagchi, A. and I. Ray (Eds.). Springer, Berlin, Germany, ISBN:978-3-642-45203-1, pp: 329-344.

Raza, S., H. Shafagh, K. Hewage, R. Hummen and T. Voigt, 2013. Lithe: Lightweight secure CoAP for the internet of things. IEEE. Sens. J., 13: 3711-3720.
CrossRef  |  Direct Link  |  

Roman, R., J. Zhou and J. Lopez, 2013. On the features and challenges of security and privacy in distributed internet of things. Comput. Netw., 57: 2266-2279.
Direct Link  |  

Rouselakis, Y. and B. Waters, 2015. Efficient Statically-Secure Large-Universe Multi-Authority Attribute-Based Encryption. In: Financial Cryptography and Data Security, Bohme, R. and T. Okamoto (Eds.). Springer, Berlin, Germany, ISBN:978-3-662-47853-0, pp: 315-332.

Yang, K., X. Jia and K. Ren, 2013. Attribute-based fine-grained access control with efficient revocation in cloud storage systems. Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security, May 08-10, 2013, ACM, New York, USA., ISBN:978-1-4503-1767-2, pp: 523-528.

Yu, S., C. Wang, K. Ren and W. Lou, 2010. Attribute based data sharing with attribute revocation. Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, April 13-16, 2010, Beijing, China, pp: 261-270.

Zhang, Y., X. Chen, J. Li, H. Li and F. Li, 2014. Attribute-based data sharing with flexible and direct revocation in cloud computing. KSII. Trans. Internet Inf. Syst., 8: 4028-4049.
Direct Link  |  

Zhu, Z., Z. Jiang and R. Jiang, 2013. The attack on Mona: Secure multi-owner data sharing for dynamic groups in the cloud. Proceedings of the 2013 International Conference on Information Science and Cloud Computing Companion (ISCC-C), December 7-8, 2013, IEEE, Guangzhou, China, ISBN:978-1-4799-5245-8, pp: 213-218.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved