{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T20:01:06Z","timestamp":1729627266811,"version":"3.28.0"},"reference-count":33,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,9]]},"DOI":"10.1109\/trustcom.2014.42","type":"proceedings-article","created":{"date-parts":[[2015,1,21]],"date-time":"2015-01-21T14:37:37Z","timestamp":1421851057000},"page":"310-319","source":"Crossref","is-referenced-by-count":10,"title":["FEACS: A Flexible and Efficient Access Control Scheme for Cloud Computing"],"prefix":"10.1109","author":[{"given":"Yu","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Jing","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Ruiying","family":"Du","sequence":"additional","affiliation":[]},{"given":"Lan","family":"Deng","sequence":"additional","affiliation":[]},{"given":"Yang","family":"Xiang","sequence":"additional","affiliation":[]},{"given":"Qing","family":"Zhou","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1145\/1229285.1229330"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2010.07.006"},{"key":"18","doi-asserted-by":"crossref","first-page":"114","DOI":"10.1007\/11426639_7","article-title":"Efficient identity-based encryption without random oracles","author":"waters","year":"2005","journal-title":"Advances in Cryptology-EUROCRYPT 2005"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25516-8_18"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2009.87"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2010.12.006"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.186"},{"journal-title":"What's New about Cloud Computing Security","year":"2010","author":"chen","key":"14"},{"key":"11","doi-asserted-by":"crossref","first-page":"162","DOI":"10.1007\/978-3-642-36362-7_11","article-title":"Attribute-based encryption with fast decryption","author":"hohenberger","year":"2013","journal-title":"Public Key Cryptography-PKC 2013"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-4189-1_1"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462174"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653678"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2172209"},{"key":"23","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1145\/1315245.1315270","article-title":"Attribute-based encryption with non-monotonic access structures","author":"ostrovsky","year":"2007","journal-title":"Proceedings of the 14th ACM conference on Computer and Communications Security"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.23"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455823"},{"key":"26","article-title":"Arbitrary-state attribute-based encryption with dynamic membership","author":"fan","year":"2013","journal-title":"IEEE Transactions on Computers"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1145\/1008731.1008734"},{"journal-title":"The Pairing-Based Cryptography (PBC) library","year":"2012","author":"lynn","key":"28"},{"journal-title":"Secure schemes for secret sharing and key distribution","year":"1996","author":"beimel","key":"29"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/1721654.1721672"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/1383519.1383526"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180418"},{"key":"1","first-page":"7","article-title":"The nist definition of cloud computing (draft)","volume":"800","author":"mell","year":"2010","journal-title":"NIST Special Publication"},{"key":"30","doi-asserted-by":"crossref","first-page":"586","DOI":"10.1137\/S0097539701398521","article-title":"Identity-based encryption from the weil pairing","volume":"32","author":"boneh","year":"2003","journal-title":"SIAM Journal on Computing"},{"key":"7","doi-asserted-by":"crossref","first-page":"136","DOI":"10.1007\/978-3-642-14992-4_13","article-title":"Cryptographic cloud storage","author":"kamara","year":"2010","journal-title":"Financial Cryptography and Data Security"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.97"},{"key":"32","doi-asserted-by":"crossref","first-page":"547","DOI":"10.1007\/978-3-642-20465-4_30","article-title":"Unbounded hibe and attribute-based encryption","author":"lewko","year":"2011","journal-title":"Advances in Cryptology-Eurocrypt 2011"},{"key":"5","doi-asserted-by":"crossref","first-page":"457","DOI":"10.1007\/11426639_27","article-title":"Fuzzy identity-based encryption","author":"sahai","year":"2005","journal-title":"Advances in Cryptology-EUROCRYPT 2005"},{"key":"31","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1007\/978-3-642-19379-8_4","article-title":"Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization","author":"waters","year":"2011","journal-title":"Public Key Cryptography-PKC 2011"},{"journal-title":"Hosting Enterprise Data in the Cloud-Part 9 Investment Value Zetta","year":"2010","author":"bell","key":"4"},{"key":"9","doi-asserted-by":"crossref","first-page":"1299","DOI":"10.3724\/SP.J.1001.2011.03993","article-title":"Attribute based encryption schemes","volume":"22","author":"su","year":"2011","journal-title":"Journal of Software"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.11"}],"event":{"name":"2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","start":{"date-parts":[[2014,9,24]]},"location":"Beijing, China","end":{"date-parts":[[2014,9,26]]}},"container-title":["2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7008824\/7011202\/07011265.pdf?arnumber=7011265","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T00:03:42Z","timestamp":1498176222000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7011265\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,9]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/trustcom.2014.42","relation":{},"subject":[],"published":{"date-parts":[[2014,9]]}}}