Attribute-based encryption for cloud computing access control: A survey
Attribute-based encryption (ABE) for cloud computing access control is reviewed in this
article. A taxonomy and comprehensive assessment criteria of ABE are first proposed. In the …
article. A taxonomy and comprehensive assessment criteria of ABE are first proposed. In the …
Blockchain-enhanced data sharing with traceable and direct revocation in IIoT
The industrial Internet of Things (IIoT) supports recent developments in data management
and information services, as well as services for smart factories. Nowadays, many mature …
and information services, as well as services for smart factories. Nowadays, many mature …
Towards secure and privacy-preserving data sharing for COVID-19 medical records: A blockchain-empowered approach
COVID-19 is currently a major global public health challenge. In the battle against the
outbreak of COVID-19, how to manage and share the COVID-19 Electric Medical Records …
outbreak of COVID-19, how to manage and share the COVID-19 Electric Medical Records …
Attribute-based encryption with parallel outsourced decryption for edge intelligent IoV
Edge intelligence is an emerging concept referring to processes in which data are collected
and analyzed and insights are delivered close to where the data are captured in a network …
and analyzed and insights are delivered close to where the data are captured in a network …
A verifiable and fair attribute-based proxy re-encryption scheme for data sharing in clouds
To manage outsourced encrypted data sharing in clouds, attribute-based proxy re-
encryption (ABPRE) has become an elegant primitive. In ABPRE, a cloud server can …
encryption (ABPRE) has become an elegant primitive. In ABPRE, a cloud server can …
TRAC: Traceable and revocable access control scheme for mHealth in 5G-enabled IIoT
Mobile healthcare (mHealth) enables people to collect and share their personal health
records (PHRs) and gain rapid medical treatment via mobile 5G-enabled Industrial Internet …
records (PHRs) and gain rapid medical treatment via mobile 5G-enabled Industrial Internet …
Auditable -Time Outsourced Attribute-Based Encryption for Access Control in Cloud Computing
As a sophisticated mechanism for secure finegrained access control over encrypted data,
ciphertext-policy attribute-based encryption (CP-ABE) is one of the highly promising …
ciphertext-policy attribute-based encryption (CP-ABE) is one of the highly promising …
Attribute-based privacy-preserving data sharing for dynamic groups in cloud computing
The sharing of personal data with multiple users from different domains has been benefited
considerably from the rapid advances of cloud computing, and it is highly desirable to …
considerably from the rapid advances of cloud computing, and it is highly desirable to …
A fast CP-ABE system for cyber-physical security and privacy in mobile healthcare network
A healthcare network as a new context-aware cyber-physical system (CPS) includes
embedded sensors, Internet of Things technology, and cloud computing. With the …
embedded sensors, Internet of Things technology, and cloud computing. With the …
Partially policy-hidden attribute-based broadcast encryption with secure delegation in edge computing
The rapid growth of data has successfully promoted the development of edge computing,
which is used for processing the data at the edge of network. The emergence of edge …
which is used for processing the data at the edge of network. The emergence of edge …