{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T21:32:19Z","timestamp":1726003939640},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030017002"},{"type":"electronic","value":"9783030017019"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-01701-9_1","type":"book-chapter","created":{"date-parts":[[2018,12,28]],"date-time":"2018-12-28T17:03:08Z","timestamp":1546016588000},"page":"3-21","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["A Secure Remote Monitoring Framework Supporting Efficient Fine-Grained Access Control and Data Processing in IoT"],"prefix":"10.1007","author":[{"given":"Yaxing","family":"Chen","sequence":"first","affiliation":[]},{"given":"Wenhai","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Ning","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Qinghua","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Wenjing","family":"Lou","sequence":"additional","affiliation":[]},{"given":"Y. Thomas","family":"Hou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,29]]},"reference":[{"key":"1_CR1","doi-asserted-by":"crossref","unstructured":"Hassanalieragh, M., Page, A., Soyata, T.: Health monitoring and management using Internet-of-Things (IoT) sensing with cloud-based processing: opportunities and challenges. In: IEEE SCC 2015 (2015)","DOI":"10.1109\/SCC.2015.47"},{"issue":"1","key":"1_CR2","first-page":"131","volume":"24","author":"M Li","year":"2013","unstructured":"Li, M., Yu, S., Zheng, Y., Ren, K., Lou, W.: Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE TPDS 24(1), 131\u2013143 (2013)","journal-title":"IEEE TPDS"},{"key":"1_CR3","doi-asserted-by":"crossref","unstructured":"Yu, S., Wang, C., Ren, K., Lou, W.: Achieving secure, scalable, and fine-grained data access control in cloud computing. In: IEEE INFOCOM 2010, pp. 1\u20139 (2010)","DOI":"10.1109\/INFCOM.2010.5462174"},{"key":"1_CR4","doi-asserted-by":"crossref","unstructured":"Sun, W., Yu, S., Lou, W., Hou, Y.T., Li, H.: Protecting your right: attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud. In: IEEE INFOCOM 2014, pp. 226\u2013234 (2014)","DOI":"10.1109\/INFOCOM.2014.6847943"},{"issue":"2","key":"1_CR5","first-page":"743","volume":"7","author":"A Wan","year":"2012","unstructured":"Wan, A., Liu, J., Deng, R.H.: HASBE: a hierarchical attribute-based solution for flexible and scalable access control in cloud computing. IEEE TIFS 7(2), 743\u2013754 (2012)","journal-title":"IEEE TIFS"},{"key":"1_CR6","doi-asserted-by":"crossref","unstructured":"Yao, A.C.: Protocols for secure computations. In: IEEE SFCS 1982, pp. 160\u2013164 (1982)","DOI":"10.1109\/SFCS.1982.38"},{"key":"1_CR7","doi-asserted-by":"crossref","unstructured":"Gentry, C.: Fully homomorphic encryption using ideal lattices. In: ACM STOC 2009, pp. 97\u2013105 (2009)","DOI":"10.1145\/1536414.1536440"},{"key":"1_CR8","doi-asserted-by":"crossref","unstructured":"Fernandes, E., Jung, J., Prakash, A.: Security analysis of emerging smart home applications. In: IEEE S&P 2016, pp. 636\u2013654 (2016)","DOI":"10.1109\/SP.2016.44"},{"key":"1_CR9","unstructured":"Costan, V., Devadas, S.: Intel SGX explained. IACR Cryptology ePrint Archive, 86 (2016)"},{"key":"1_CR10","doi-asserted-by":"crossref","unstructured":"McKeen, F., Alexandrovich, L., Berenzon, A., Rozas, C., Shafi, H.: Innovative instructions and software model for isolated execution. In: Hardware and Architectural Support for Security and Privacy (2013)","DOI":"10.1145\/2487726.2488368"},{"key":"1_CR11","unstructured":"Anati, I., Gueron, S., Johnson, S.P., Scarlata, V.R.: Innovative technology for CPU based attestation and sealing. In: Hardware and Architectural Support for Security and Privacy (2013)"},{"key":"1_CR12","unstructured":"Lee, S., Shih, M., Gera, P., Kim, T., Kim, H., Peinado, M.: Inferring fine-grained control flow inside SGX enclaves with branch shadowing. In: USENIX Security Symposium, pp. 557\u2013574 (2017)"},{"key":"1_CR13","doi-asserted-by":"crossref","unstructured":"Wang, W., et al.: Leaky cauldron on the dark land: understanding memory side-channel hazards in SGX. In: ACM CCS 2017, pp. 2421\u20132434 (2017)","DOI":"10.1145\/3133956.3134038"},{"key":"1_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1007\/11426639_27","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2005","author":"A Sahai","year":"2005","unstructured":"Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457\u2013473. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11426639_27"},{"key":"1_CR15","doi-asserted-by":"crossref","unstructured":"Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: ACM CCS 2006, p. 89 (2006)","DOI":"10.1145\/1180405.1180418"},{"key":"1_CR16","doi-asserted-by":"crossref","unstructured":"Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: IEEE S&P 2007, pp. 321\u2013334 (2007)","DOI":"10.1109\/SP.2007.11"},{"key":"1_CR17","doi-asserted-by":"crossref","unstructured":"Wang, X., Zhang, J., Schooler, E.M., Ion, M.: Performance evaluation of attribute-based encryption: toward data privacy in the IoT. In: IEEE ICC 2014, pp. 725\u2013730 (2014)","DOI":"10.1109\/ICC.2014.6883405"},{"key":"1_CR18","doi-asserted-by":"crossref","unstructured":"Yang, L., Humayed, A., Li, F.: A multi-cloud based privacy-preserving data publishing scheme for the Internet of Things. In: ACM ACSAC 2016, pp. 30\u201339 (2016)","DOI":"10.1145\/2991079.2991127"},{"key":"1_CR19","doi-asserted-by":"publisher","first-page":"12941","DOI":"10.1109\/ACCESS.2017.2727054","volume":"5","author":"Q Huang","year":"2017","unstructured":"Huang, Q., Yang, Y., Wang, L.: Secure data access control with ciphertext update and computation outsourcing in fog computing for Internet of Things. IEEE Access 5, 12941\u201312950 (2017)","journal-title":"IEEE Access"},{"issue":"2","key":"1_CR20","doi-asserted-by":"publisher","first-page":"753","DOI":"10.1016\/j.future.2016.12.015","volume":"78","author":"P Zhang","year":"2018","unstructured":"Zhang, P., Chen, Z., Liu, J.K., Liang, K., Liu, H.: An efficient access control scheme with outsourcing capability and attribute update for fog computing. Future Gener. Comput. Syst. 78(2), 753\u2013762 (2018)","journal-title":"Future Gener. Comput. Syst."},{"issue":"3","key":"1_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2799647","volume":"33","author":"A Baumann","year":"2015","unstructured":"Baumann, A., Peinado, M., Hunt, G.: Shielding applications from an untrusted cloud with Haven. ACM TCS 33(3), 1\u201326 (2015)","journal-title":"ACM TCS"},{"key":"1_CR22","unstructured":"Abadi, M., Barham, P., Chen, J., et al.: TensorFlow: a system for large-scale machine learning. In: USENIX OSDI 2016, pp. 265\u2013284 (2016)"},{"key":"1_CR23","doi-asserted-by":"crossref","unstructured":"Shinde, S., Tien, D.L., Tople, S., Saxena, P.: PANOPLY: low-TCB Linux applications with SGX enclaves. In: NDSS 2017 (2017)","DOI":"10.14722\/ndss.2017.23500"},{"key":"1_CR24","doi-asserted-by":"crossref","unstructured":"Fisch, B.A., Vinayagamurthy, D., Boneh, D., Gorbunov, S.: Iron: functional encryption using Intel SGX. In: ACM CCS 2017, pp. 765\u2013782 (2017)","DOI":"10.1145\/3133956.3134106"},{"key":"1_CR25","doi-asserted-by":"crossref","unstructured":"Sun, W., Zhang, R., Lou, W., Hou, Y.T.: REARGUARD: secure keyword search using trusted hardware. In: IEEE INFORM 2018 (2018)","DOI":"10.1109\/INFOCOM.2018.8485838"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Communication Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-01701-9_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,13]],"date-time":"2019-11-13T06:11:53Z","timestamp":1573625513000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-01701-9_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030017002","9783030017019"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-01701-9_1","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"SecureComm","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security and Privacy in Communication Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Singapore","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Singapore","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 August 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 August 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"securecomm2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/securecomm.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}