ASIA unversity:Item 310904400/25385
English  |  正體中文  |  简体中文  |  全文筆數/總筆數 : 90437/105768 (86%)
造訪人次 : 10975651      線上人數 : 569
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
搜尋範圍 查詢小技巧:
  • 您可在西文檢索詞彙前後加上"雙引號",以獲取較精準的檢索結果
  • 若欲以作者姓名搜尋,建議至進階搜尋限定作者欄位,可獲得較完整資料
  • 進階搜尋
    ASIA unversity > 資訊學院 > 資訊工程學系 > 期刊論文 >  Item 310904400/25385


    題名: A Survey on Attribute-Based Encryption Schemes of Access Control in Cloud Environments
    作者: Chu, Pei-Shan;Lee, Cheng-Chi;Chu, Pei-Shan;Chung, Pei-Shan;黃明祥;Hwang, Min-Shiang
    貢獻者: 資訊工程學系
    關鍵詞: Cloud computing;attribute-based encryption;access control;fine-grained access;revocation
    日期: 2013-07
    上傳時間: 2013-07-11 14:19:31 (UTC+8)
    摘要: In Attribute-based Encryption (ABE) scheme, attributes play a very important role. Attributes have been ex-ploited to generate a public key for encrypting data and have been used as an access policy to control users' access. The access policy can be categorized as either key-policy or ciphertext-policy. The key-policy is the access structure on the user's private key, and the ciphertext-policy is the access structure on the ciphertext. And the access structure can also be categorized as either monotonic or non-monotonic one. Using ABE schemes can have the advantages: (1) to reduce the communication overhead of the Internet, and (2) to provide a ¯ne-grained access control. In this paper, we survey a basic attribute-based encryption scheme, two various access policy attribute-based encryption schemes, and two various access structures, which are analyzed for cloud environments. Finally, we list the comparisons of these schemes by some criteria for cloud environments.
    關聯: International Journal of Network Security,15(4):231-240.
    顯示於類別:[資訊工程學系] 期刊論文


    檔案 大小格式瀏覽次數


    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - 回饋