{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,16]],"date-time":"2024-09-16T19:11:32Z","timestamp":1726513892284},"publisher-location":"New York, NY, USA","reference-count":3,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,10,4]]},"DOI":"10.1145\/1866307.1866414","type":"proceedings-article","created":{"date-parts":[[2010,10,5]],"date-time":"2010-10-05T14:38:23Z","timestamp":1286289503000},"update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":280,"title":["Hierarchical attribute-based encryption for fine-grained access control in cloud storage services"],"prefix":"10.1145","author":[{"given":"Guojun","family":"Wang","sequence":"first","affiliation":[{"name":"Central South University, P. R. China, Changsha, China"}]},{"given":"Qin","family":"Liu","sequence":"additional","affiliation":[{"name":"Central South University, P. R. China, Changsha, China"}]},{"given":"Jie","family":"Wu","sequence":"additional","affiliation":[{"name":"Temple University, Philadelphia, PA, USA"}]}],"member":"320","published-online":{"date-parts":[[2010,10,4]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/647098.717144"},{"key":"e_1_3_2_1_2_1","first-page":"20","volume-title":"Proceedings of ICISC","author":"Muller S.","year":"2008","unstructured":"}} S. Muller , S. Katzenbeisser , and C. Eckert . Distributed Attribute-Based Encryption . In Proceedings of ICISC 2008 , pages 20 -- 36 . }}S. Muller, S. Katzenbeisser, and C. Eckert. Distributed Attribute-Based Encryption. In Proceedings of ICISC 2008, pages 20--36."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/1833515.1833621"}],"event":{"name":"CCS '10: 17th ACM Conference on Computer and Communications Security 2010","location":"Chicago Illinois USA","acronym":"CCS '10","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 17th ACM conference on Computer and communications security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1866307.1866414","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,10]],"date-time":"2023-01-10T01:23:44Z","timestamp":1673313824000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1866307.1866414"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,10,4]]},"references-count":3,"alternative-id":["10.1145\/1866307.1866414","10.1145\/1866307"],"URL":"https:\/\/doi.org\/10.1145\/1866307.1866414","relation":{},"subject":[],"published":{"date-parts":[[2010,10,4]]},"assertion":[{"value":"2010-10-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}