{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T17:29:33Z","timestamp":1725902973203},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319615417"},{"type":"electronic","value":"9783319615424"}],"license":[{"start":{"date-parts":[[2017,7,5]],"date-time":"2017-07-05T00:00:00Z","timestamp":1499212800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-61542-4_93","type":"book-chapter","created":{"date-parts":[[2017,7,4]],"date-time":"2017-07-04T04:02:27Z","timestamp":1499140947000},"page":"917-926","source":"Crossref","is-referenced-by-count":5,"title":["Towards the CP-ABE Application for Privacy-Preserving Secure Data Sharing in IoT Contexts"],"prefix":"10.1007","author":[{"given":"Salvador","family":"P\u00e9rez","sequence":"first","affiliation":[]},{"given":"Domenico","family":"Rotondi","sequence":"additional","affiliation":[]},{"given":"Diego","family":"Pedone","sequence":"additional","affiliation":[]},{"given":"Leonardo","family":"Straniero","sequence":"additional","affiliation":[]},{"given":"Mar\u00eda Jos\u00e9","family":"N\u00fa\u00f1ez","sequence":"additional","affiliation":[]},{"given":"Fernando","family":"Gigante","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,7,5]]},"reference":[{"key":"93_CR1","doi-asserted-by":"crossref","unstructured":"Ambrosin, M., Conti, M., Dargahi, T.: On the feasibility of attribute-based encryption on smartphone devices. In: Proceedings of the 2015 Workshop on IoT challenges in Mobile and Industrial Systems, pp. 49\u201354. ACM (2015)","DOI":"10.1145\/2753476.2753482"},{"key":"93_CR2","unstructured":"Barker, E., Chen, L., Roginsky, A., Smid, M.: Recommendation for pair-wise key establishment schemes using discrete logarithm cryptography. In: Technical Report; National Institute of Standards and Technology (NIST): Gaithersburg, MD, USA, 2006, 2012. Citeseer (2006)"},{"key":"93_CR3","doi-asserted-by":"crossref","unstructured":"Bernabe, J.B., Hern\u00e1ndez, J.L., Moreno, M.V., Gomez, A.F.S.: Privacy-preserving security framework for a social-aware internet of things. In: International Conference on Ubiquitous Computing and Ambient Intelligence, pp. 408\u2013415. Springer (2014)","DOI":"10.1007\/978-3-319-13102-3_67"},{"key":"93_CR4","doi-asserted-by":"crossref","unstructured":"Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy, SP 2007, pp. 321\u2013334. IEEE (2007)","DOI":"10.1109\/SP.2007.11"},{"key":"93_CR5","doi-asserted-by":"crossref","unstructured":"Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM conference on Computer and communications security, pp. 89\u201398. ACM (2006)","DOI":"10.1145\/1180405.1180418"},{"key":"93_CR6","doi-asserted-by":"crossref","unstructured":"Jones: JSON Web Algorithms (JWA). RFC 7518, RFC Editor (2015)","DOI":"10.17487\/RFC7518"},{"key":"93_CR7","doi-asserted-by":"crossref","unstructured":"Jones, M.: JSON Web Key (JWK). RFC 7517, RFC Editor (2015)","DOI":"10.17487\/RFC7517"},{"key":"93_CR8","unstructured":"Kahate, A.: Cryptography and Network Security. Tata McGraw-Hill Education (2013)"},{"key":"93_CR9","doi-asserted-by":"crossref","first-page":"266","DOI":"10.1016\/j.future.2015.01.009","volume":"55","author":"A Lounis","year":"2016","unstructured":"Lounis, A., Hadjidj, A., Bouabdallah, A., Challal, Y.: Healing on the cloud: secure cloud architecture for medical wireless sensor networks. Fut. Gener. Comput. Syst. 55, 266\u2013277 (2016)","journal-title":"Fut. Gener. Comput. Syst."},{"key":"93_CR10","doi-asserted-by":"crossref","unstructured":"McGrew, D., Igoe, K., Salter, M.: Fundamental elliptic curve cryptography algorithms. RFC 6090, RFC Editor (2011)","DOI":"10.17487\/rfc6090"},{"key":"93_CR11","doi-asserted-by":"crossref","unstructured":"Odelu, V., Das, A.K., Rao, Y.S., Kumari, S., Khan, M.K., Choo, K.K.R.: Pairing-based CP-ABE with constant-size ciphertexts and secret keys for cloud environment. Comput. Stan. Interfaces (2016)","DOI":"10.1016\/j.csi.2016.05.002"},{"key":"93_CR12","doi-asserted-by":"crossref","unstructured":"P\u00e9rez Franco, S., H\u00e9rnandez-Ramos, J.L., Skarmeta, A.F., Pedone, D., Rotondi, D., Straniero, L.: A digital envelope approach using attribute-based encryption for secure data exchange in IoT scenarios. In: 2017 IEEE 1st Global Internet of Things Summit, GIoTS. IEEE (2017)","DOI":"10.1109\/GIOTS.2017.8016281"},{"issue":"10","key":"93_CR13","doi-asserted-by":"crossref","first-page":"2266","DOI":"10.1016\/j.comnet.2012.12.018","volume":"57","author":"R Roman","year":"2013","unstructured":"Roman, R., Zhou, J., Lopez, J.: On the features and challenges of security and privacy in distributed internet of things. Comp. Netw. 57(10), 2266\u20132279 (2013)","journal-title":"Comp. Netw."},{"key":"93_CR14","doi-asserted-by":"crossref","unstructured":"Ross, R., McEvilley, M., Oren, J.: Systems security engineering: considerations for a multidisciplinary approach in the engineering of trustworthy secure systems. National Institute of Standards and Technology (2016)","DOI":"10.6028\/NIST.SP.800-160"},{"key":"93_CR15","unstructured":"Selander, G., Mattsson, J., Palombini, F.: Ephemeral Diffie-Hellman over cose (EDHOC). Internet-draft, IETF Secretariat (2016)"},{"key":"93_CR16","unstructured":"Tene, O., Polonetsky, J.: Big data for all: privacy and user control in the age of analytics. Nw. J. Tech. Intell. Prop. 11 (2012). xxvii"},{"key":"93_CR17","doi-asserted-by":"crossref","unstructured":"Touati, L., Challal, Y., Bouabdallah, A.: C-CP-ABE: cooperative ciphertext policy attribute-based encryption for the internet of things. In: 2014 International Conference on Advanced Networking Distributed Systems and Applications (INDS), pp. 64\u201369. IEEE (2014)","DOI":"10.1109\/INDS.2014.19"},{"key":"93_CR18","doi-asserted-by":"crossref","unstructured":"Wang, X., Zhang, J., Schooler, E., Ion, M.: Performance evaluation of attribute-based encryption: toward data privacy in the IoT. In: 2014 IEEE International Conference on Communications (ICC), pp. 725\u2013730. IEEE (2014)","DOI":"10.1109\/ICC.2014.6883405"},{"issue":"2","key":"93_CR19","doi-asserted-by":"crossref","first-page":"289","DOI":"10.1080\/10798587.2015.1095488","volume":"22","author":"A Xiong","year":"2016","unstructured":"Xiong, A., Xu, C.: Cloud storage access control scheme of ciphertext algorithm based on digital envelope. Intel. Autom. Soft Comput. 22(2), 289\u2013294 (2016)","journal-title":"Intel. Autom. Soft Comput."}],"container-title":["Advances in Intelligent Systems and Computing","Innovative Mobile and Internet Services in Ubiquitous Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-61542-4_93","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,28]],"date-time":"2019-09-28T07:01:57Z","timestamp":1569654117000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-61542-4_93"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7,5]]},"ISBN":["9783319615417","9783319615424"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-61542-4_93","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2017,7,5]]}}}