{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T08:52:19Z","timestamp":1725871939989},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319504711"},{"type":"electronic","value":"9783319504728"}],"license":[{"start":{"date-parts":[[2016,11,26]],"date-time":"2016-11-26T00:00:00Z","timestamp":1480118400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-50472-8_12","type":"book-chapter","created":{"date-parts":[[2016,11,25]],"date-time":"2016-11-25T11:17:15Z","timestamp":1480072635000},"page":"147-158","source":"Crossref","is-referenced-by-count":0,"title":["An Efficient Framework for Verifiable Access Control Based Dynamic Data Updates in Public Cloud"],"prefix":"10.1007","author":[{"given":"S.","family":"Sabitha","sequence":"first","affiliation":[]},{"given":"M. S.","family":"Rajasree","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,11,26]]},"reference":[{"key":"12_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1007\/978-3-540-70936-7_28","volume-title":"Theory of Cryptography","author":"M Chase","year":"2007","unstructured":"Chase, M.: Multi-authority attribute based encryption. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 515\u2013534. Springer, Heidelberg (2007). doi: 10.1007\/978-3-540-70936-7_28"},{"key":"12_CR2","doi-asserted-by":"crossref","unstructured":"Chase, M., Chow, S.S.M.: Improving privacy and security in multi-authority attribute-based encryption. In: Proceedings of the ACM Conference on Computer and Communications Security, pp. 121\u2013130 (2009)","DOI":"10.1145\/1653662.1653678"},{"key":"12_CR3","unstructured":"Green, M., Hohenberger, S., Waters, B.: Outsourcing the decryption of ABE ciphertexts. In: Proceedings of the USENIX Security Symposium, vol. 3 (2011)"},{"key":"12_CR4","doi-asserted-by":"crossref","unstructured":"Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: Proceedings of the IEEE Symposium Security and Privacy, pp. 321\u2013334 (2007)","DOI":"10.1109\/SP.2007.11"},{"issue":"7","key":"12_CR5","doi-asserted-by":"crossref","first-page":"1214","DOI":"10.1109\/TPDS.2010.203","volume":"22","author":"J Hur","year":"2011","unstructured":"Hur, J., Noh, D.K.: Attribute-based access control with efficient revocation in data outsourcing systems. IEEE Trans. Parallel Distrib. Syst. 22(7), 1214\u20131221 (2011)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"12_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"568","DOI":"10.1007\/978-3-642-20465-4_31","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2011","author":"A Lewko","year":"2011","unstructured":"Lewko, A., Waters, B.: Decentralizing attribute-based encryption. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 568\u2013588. Springer, Heidelberg (2011). doi: 10.1007\/978-3-642-20465-4_31"},{"key":"12_CR7","unstructured":"Lynn, B.: The pairing-based cryptography (PBC) library (2012). http:\/\/crypto.stanford.edu\/pbc"},{"key":"12_CR8","unstructured":"Maji, H.K., Prabhakaran, M., Rosulek, M.: Attribute-based signatures: achieving attribute-privacy and collusion-resistance. IACR Cryptology ePrint Archive (2008)"},{"key":"12_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"376","DOI":"10.1007\/978-3-642-19074-2_24","volume-title":"Topics in Cryptology \u2013 CT-RSA 2011","author":"HK Maji","year":"2011","unstructured":"Maji, H.K., Prabhakaran, M., Rosulek, M.: Attribute-based signatures. In: Kiayias, A. (ed.) CT-RSA 2011. LNCS, vol. 6558, pp. 376\u2013392. Springer, Heidelberg (2011). doi: 10.1007\/978-3-642-19074-2_24"},{"key":"12_CR10","doi-asserted-by":"crossref","unstructured":"Ruj, S., Nayak, A., Stojmenovic, I.: DACC: distributed access control in clouds. In: IEEE 10th International Conference Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 91\u201398 (2011)","DOI":"10.1109\/TrustCom.2011.15"},{"issue":"2","key":"12_CR11","doi-asserted-by":"crossref","first-page":"384","DOI":"10.1109\/TPDS.2013.38","volume":"25","author":"S Ruj","year":"2014","unstructured":"Ruj, S., Stojmenovic, M., Nayak, A.: Decentralized access control with anonymous authentication of data stored in clouds. IEEE Trans. Parallel Distrib. Syst. 25(2), 384\u2013394 (2014)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"12_CR12","doi-asserted-by":"crossref","unstructured":"Wang, G., Liu, Q., Wu, J.: Hierarchical attribute-based encryption for fine-grained access control in cloud storage services. In: 17th ACM Conference Computer and Communications Security, (CCS), pp. 735\u2013737 (2010)","DOI":"10.1145\/1866307.1866414"},{"issue":"12","key":"12_CR13","doi-asserted-by":"crossref","first-page":"1443","DOI":"10.1002\/cpe.1698","volume":"23","author":"G Wang","year":"2011","unstructured":"Wang, G., Liu, Q., Jie, W.: Achieving fine-grained access control for secure data sharing on cloud servers. Concurr. Comput.: Pract. Exp. 23(12), 1443\u20131464 (2011)","journal-title":"Concurr. Comput.: Pract. Exp."},{"issue":"6","key":"12_CR14","doi-asserted-by":"crossref","first-page":"1165","DOI":"10.1109\/TIFS.2016.2520886","volume":"11","author":"H Wang","year":"2016","unstructured":"Wang, H., He, D., Tang, S.: Identity-based proxy-oriented data uploading and remote data integrity checking in public cloud. IEEE Trans. Inf. Forensics Secur. 11(6), 1165\u20131176 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"5","key":"12_CR15","doi-asserted-by":"crossref","first-page":"847","DOI":"10.1109\/TPDS.2010.183","volume":"22","author":"Q Wang","year":"2011","unstructured":"Wang, Q., Wang, C., Ren, K., Lou, W., Li, J.: Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans. Parallel Distrib. Syst. 22(5), 847\u2013859 (2011)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"12_CR16","doi-asserted-by":"crossref","unstructured":"Yang, K., Jia, X., Ren, K., DAC-MACS: effective data access control for multi-authority cloud storage systems. IACR Cryptology ePrint Archive, pp. 419\u2013429 (2012)","DOI":"10.1109\/INFCOM.2013.6567100"},{"key":"12_CR17","doi-asserted-by":"crossref","unstructured":"Yu, S., Wang, C., Ren, K., Lou, W.: Attribute based data sharing with attribute revocation. In: ACM Symposium on Information, Computer and Communications Security (ASIACCS), pp. 261\u2013270 (2010)","DOI":"10.1145\/1755688.1755720"}],"container-title":["Lecture Notes in Computer Science","Distributed Computing and Internet Technology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-50472-8_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,15]],"date-time":"2019-09-15T19:59:25Z","timestamp":1568577565000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-50472-8_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,11,26]]},"ISBN":["9783319504711","9783319504728"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-50472-8_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016,11,26]]}}}