Cargando…
A Secure and Verifiable Outsourced Access Control Scheme in Fog-Cloud Computing
With the rapid development of big data and Internet of things (IOT), the number of networking devices and data volume are increasing dramatically. Fog computing, which extends cloud computing to the edge of the network can effectively solve the bottleneck problems of data transmission and data stora...
Autores principales: | Fan, Kai, Wang, Junxiong, Wang, Xin, Li, Hui, Yang, Yintang |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2017
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5551097/ https://www.ncbi.nlm.nih.gov/pubmed/28737733 http://dx.doi.org/10.3390/s17071695 |
Ejemplares similares
-
EVOAC-HP: An Efficient and Verifiable Outsourced Access Control Scheme with Hidden Policy
por: Ma, Haobin, et al.
Publicado: (2023) -
Analysis of an ABE Scheme with Verifiable Outsourced Decryption
por: Liao, Yongjian, et al.
Publicado: (2018) -
Secure Data Access Control for Fog Computing Based on Multi-Authority Attribute-Based Signcryption with Computation Outsourcing and Attribute Revocation
por: Xu, Qian, et al.
Publicado: (2018) -
Two-Cloud-Servers-Assisted Secure Outsourcing Multiparty Computation
por: Sun, Yi, et al.
Publicado: (2014) -
Secure Outsourcing of Matrix Determinant Computation under the Malicious Cloud
por: Song, Mingyang, et al.
Publicado: (2021)