Cargando…
Secure Data Access Control for Fog Computing Based on Multi-Authority Attribute-Based Signcryption with Computation Outsourcing and Attribute Revocation
Nowadays, fog computing provides computation, storage, and application services to end users in the Internet of Things. One of the major concerns in fog computing systems is how fine-grained access control can be imposed. As a logical combination of attribute-based encryption and attribute-based sig...
Autores principales: | Xu, Qian, Tan, Chengxiang, Fan, Zhijie, Zhu, Wenye, Xiao, Ya, Cheng, Fujia |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2018
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5982144/ https://www.ncbi.nlm.nih.gov/pubmed/29772840 http://dx.doi.org/10.3390/s18051609 |
Ejemplares similares
-
An efficient and secure attribute based signcryption scheme with LSSS access structure
por: Hong, Hanshu, et al.
Publicado: (2016) -
A Secure and Verifiable Outsourced Access Control Scheme in Fog-Cloud Computing
por: Fan, Kai, et al.
Publicado: (2017) -
An Efficient and Secure Revocation-Enabled Attribute-Based Access Control for eHealth in Smart Society
por: Khan, Shahzad, et al.
Publicado: (2022) -
Searchable attribute-based encryption scheme with attribute revocation in cloud storage
por: Wang, Shangping, et al.
Publicado: (2017) -
Survey on Revocation in Ciphertext-Policy Attribute-Based Encryption
por: Al-Dahhan, Ruqayah R., et al.
Publicado: (2019)