Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Attribute-based encryption for cloud computing access control: A survey
Attribute-based encryption (ABE) for cloud computing access control is reviewed in this
article. A taxonomy and comprehensive assessment criteria of ABE are first proposed. In the …
article. A taxonomy and comprehensive assessment criteria of ABE are first proposed. In the …
A survey on access control mechanisms for cloud computing
Cloud computing is an Internet‐based computing where the information technology
resources are provided to end users following their request. With this technology, users and …
resources are provided to end users following their request. With this technology, users and …
An efficient blockchain-based hierarchical data sharing for healthcare internet of things
J Zhang, Y Yang, X Liu, J Ma - IEEE Transactions on Industrial …, 2022 - ieeexplore.ieee.org
With the assistance of the Internet of Things, the fast develo** Healthcare Internet of
Things (H-IoT) has promoted the healthcare ecosystem into the era of Health 5.0 and …
Things (H-IoT) has promoted the healthcare ecosystem into the era of Health 5.0 and …
Attribute based encryption with privacy protection and accountability for CloudIoT
The pervasive, ubiquitous, and heterogeneous properties of IoT make securing IoT systems
a very challenging task. More so when access and storage are performed through a cloud …
a very challenging task. More so when access and storage are performed through a cloud …
Blockchain-aided privacy-preserving medical data sharing scheme for e-healthcare system
Due to the massive applications of Internet of Things (IoT) and the prevalence of wearable
devices, e-healthcare systems are widely deployed in medical institutions. As a significant …
devices, e-healthcare systems are widely deployed in medical institutions. As a significant …
Efficient CP-ABE scheme with shared decryption in cloud storage
N Chen, J Li, Y Zhang, Y Guo - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Attribute-based encryption (ABE) is a preferred technology used to access control the data
stored in the cloud servers. However, in many cases, the authorized decryption user may be …
stored in the cloud servers. However, in many cases, the authorized decryption user may be …
Privacy-preserving attribute-based keyword search in shared multi-owner setting
Ciphertext-Policy Attribute-Based Keyword Search (CP-ABKS) facilitates search queries and
supports fine-grained access control over encrypted data in the cloud. However, prior CP …
supports fine-grained access control over encrypted data in the cloud. However, prior CP …
TRAC: Traceable and revocable access control scheme for mHealth in 5G-enabled IIoT
Mobile healthcare (mHealth) enables people to collect and share their personal health
records (PHRs) and gain rapid medical treatment via mobile 5G-enabled Industrial Internet …
records (PHRs) and gain rapid medical treatment via mobile 5G-enabled Industrial Internet …
Match in my way: Fine-grained bilateral access control for secure cloud-fog computing
Cloud-fog computing is a novel paradigm to extend the functionality of cloud computing to
provide a variety of on-demand data services via the edge network. Many cryptographic …
provide a variety of on-demand data services via the edge network. Many cryptographic …
Multi-authority attribute-based keyword search over encrypted cloud data
Searchable Encryption (SE) is an important technique to guarantee data security and
usability in the cloud at the same time. Leveraging Ciphertext-Policy Attribute-Based …
usability in the cloud at the same time. Leveraging Ciphertext-Policy Attribute-Based …