Access control in Internet of Things: A survey
The speedy boom of Internet of Things (IoT) devices has revolutionized many fields
including smart cities, healthcare, smart homes, etc. Most of these devices exchange …
including smart cities, healthcare, smart homes, etc. Most of these devices exchange …
An access control model for medical big data based on clustering and risk
R Jiang, S Han, Y Yu, W Ding - Information Sciences, 2023 - Elsevier
Access control has been widely adopted by distributed platforms, and its effectiveness is of
great importance to the quality of services provided by such platforms. However, traditional …
great importance to the quality of services provided by such platforms. However, traditional …
Privacy-preserving bilateral fine-grained access control for cloud-enabled industrial IoT healthcare
The expeditious development in cloud-enabled industrial Internet of Things (IIoT) healthcare
has significantly reduced the costs to monitor and protect people at home while notably …
has significantly reduced the costs to monitor and protect people at home while notably …
Privacy-aware and security-enhanced efficient matchmaking encryption
Data sharing technologies enable users to outsource data and privately share information
with arbitrary recipients without geographic barriers. However, existing efforts for secure …
with arbitrary recipients without geographic barriers. However, existing efforts for secure …
Identity-based matchmaking encryption from standard assumptions
In this work, we propose the first identity-based matchmaking encryption (IB-ME) scheme
under the standard assumptions in the standard model. This scheme is proven to be secure …
under the standard assumptions in the standard model. This scheme is proven to be secure …
A practical fog-based privacy-preserving online car-hailing service system
Aiming for minimizing passengers' waiting time and vehicles' vacancy rate, online car-
hailing service systems with fog computing has been deployed in various scenarios. In this …
hailing service systems with fog computing has been deployed in various scenarios. In this …
Privacy-preserving contact tracing in 5G-integrated and blockchain-based medical applications
The current pandemic situation due to COVID-19 is seriously affecting our daily work and
life. To block the propagation of infectious diseases, an effective contact tracing mechanism …
life. To block the propagation of infectious diseases, an effective contact tracing mechanism …
Fine-grained data sharing with enhanced privacy protection and dynamic users group service for the IoV
The Internet of Vehicles (IoV) is expected to play a revolutionary role in improving users'
driving experience and urban traffic governance. By widely absorbing emerging …
driving experience and urban traffic governance. By widely absorbing emerging …
Multi-keyword searchable and verifiable attribute-based encryption over cloud data
In cloud data sharing systems, Searchable Encryption (SE) schemes ensure data
confidentiality with retrieving, but it faces several issues in practice. First, most of the …
confidentiality with retrieving, but it faces several issues in practice. First, most of the …
Secure data sharing with flexible cross-domain authorization in autonomous vehicle systems
As an increasingly prevalent technology in intelligent autonomous transportation systems,
autonomous vehicle platoon has been indicated the ability to significantly reduce fuel …
autonomous vehicle platoon has been indicated the ability to significantly reduce fuel …