{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:52:33Z","timestamp":1740099153568,"version":"3.37.3"},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030000080"},{"type":"electronic","value":"9783030000097"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-00009-7_38","type":"book-chapter","created":{"date-parts":[[2018,9,20]],"date-time":"2018-09-20T17:20:42Z","timestamp":1537464042000},"page":"413-425","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["A CP-ABE Access Control Scheme Based on Proxy Re-encryption in Cloud Storage"],"prefix":"10.1007","author":[{"given":"Haiyong","family":"Wang","sequence":"first","affiliation":[]},{"given":"Yao","family":"Peng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,21]]},"reference":[{"key":"38_CR1","doi-asserted-by":"crossref","unstructured":"Sukhodolskiy, I.A., Zapechnikov, S.V.: An access control model for cloud storage using attribute-based encryption. In: Young Researchers in Electrical and Electronic Engineering, pp. 578\u2013581. IEEE (2017)","DOI":"10.1109\/EIConRus.2017.7910620"},{"issue":"6","key":"38_CR2","doi-asserted-by":"crossref","first-page":"1265","DOI":"10.1109\/TIFS.2016.2523941","volume":"11","author":"S Wang","year":"2016","unstructured":"Wang, S., Zhou, J., Liu, J.K., et al.: An efficient file hierarchy attribute-based encryption scheme in cloud computing. IEEE Trans. Inf. Forensics Secur. 11(6), 1265\u20131277 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"99","key":"38_CR3","first-page":"1","volume":"PP","author":"SJ De","year":"2017","unstructured":"De, S.J., Ruj, S.: Efficient decentralized attribute based access control for mobile clouds. IEEE Trans. Cloud Comput. PP(99), 1 (2017)","journal-title":"IEEE Trans. Cloud Comput."},{"issue":"7","key":"38_CR4","first-page":"146","volume":"32","author":"G Sun","year":"2011","unstructured":"Sun, G., Dong, Y., Li, Y.: CP-ABE based data access control for cloud storage. J. Commun. 32(7), 146\u2013152 (2011)","journal-title":"J. Commun."},{"issue":"2","key":"38_CR5","first-page":"1","volume":"34","author":"G Yang","year":"2014","unstructured":"Yang, G., Wang, D.-Y., Zhang, T., et al.: Attribute-based access control with multi-authority structure in cloud computing. J. Nanjing Univ. Posts Telecommun. (Nat. Sci.) 34(2), 1\u20139 (2014)","journal-title":"J. Nanjing Univ. Posts Telecommun. (Nat. Sci.)"},{"key":"38_CR6","doi-asserted-by":"crossref","unstructured":"Goyal, V., Pandey, O., Sahai, A., et al.: Attribute-based encryption for fine-grained access control of encrypted data. In: ACM Conference on Computer and Communications Security, pp. 89\u201398. ACM (2006)","DOI":"10.1145\/1180405.1180418"},{"issue":"5","key":"38_CR7","first-page":"44","volume":"37","author":"X Yan","year":"2016","unstructured":"Yan, X., Meng, H.: Ciphertext policy attribute-based encryption scheme supporting direct revocation. J. Commun. 37(5), 44\u201350 (2016)","journal-title":"J. Commun."},{"key":"38_CR8","doi-asserted-by":"crossref","unstructured":"Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy, pp. 321\u2013334. IEEE Computer Society (2007)","DOI":"10.1109\/SP.2007.11"},{"key":"38_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1007\/11426639_27","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2005","author":"A Sahai","year":"2005","unstructured":"Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457\u2013473. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11426639_27"},{"key":"38_CR10","unstructured":"Green, M., Hohenberger, S., Waters, B.: Outsourcing the decryption of ABE ciphertexts. In: Usenix Conference on Security, p. 34. USENIX Association (2011)"},{"issue":"1","key":"38_CR11","first-page":"50","volume":"4","author":"R Zhang","year":"2012","unstructured":"Zhang, R., Chen, P.S.: A dynamic cryptographic access control scheme in cloud storage services. J. Inf. Process. Manag. 4(1), 50\u201355 (2012)","journal-title":"J. Inf. Process. Manag."},{"key":"38_CR12","doi-asserted-by":"crossref","unstructured":"Ohigashi, T., Nishimura, K., Aibara, R., et al.: Implementation and evaluation of secure outsourcing scheme for secret sharing scheme on cloud storage services. In: Computer Software and Applications Conference Workshops, pp. 78\u201383. IEEE (2014)","DOI":"10.1109\/COMPSACW.2014.17"},{"issue":"10","key":"38_CR13","doi-asserted-by":"crossref","first-page":"2271","DOI":"10.1109\/TKDE.2011.78","volume":"25","author":"J Hur","year":"2013","unstructured":"Hur, J.: Improving security and efficiency in attribute-based data sharing. IEEE Trans. Knowl. Data Eng. 25(10), 2271\u20132282 (2013)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"38_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/978-3-642-19379-8_4","volume-title":"Public Key Cryptography \u2013 PKC 2011","author":"B Waters","year":"2011","unstructured":"Waters, B.: Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. LNCS, vol. 6571, pp. 53\u201370. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-19379-8_4"}],"container-title":["Lecture Notes in Computer Science","Cloud Computing and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-00009-7_38","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,24]],"date-time":"2019-10-24T09:46:27Z","timestamp":1571910387000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-00009-7_38"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030000080","9783030000097"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-00009-7_38","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"ICCCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Cloud Computing and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Haikou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 June 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 June 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"incodldos2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icccsconf.org\/icccs2018.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}