{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,20]],"date-time":"2024-07-20T02:18:23Z","timestamp":1721441903592},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2017,6,30]],"date-time":"2017-06-30T00:00:00Z","timestamp":1498780800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Pers Ubiquit Comput"],"published-print":{"date-parts":[[2017,10]]},"DOI":"10.1007\/s00779-017-1050-0","type":"journal-article","created":{"date-parts":[[2017,6,30]],"date-time":"2017-06-30T00:29:28Z","timestamp":1498782568000},"page":"937-947","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Proxy-assisted access control scheme of cloud data for smart cities"],"prefix":"10.1007","volume":"21","author":[{"given":"Kai","family":"Fan","sequence":"first","affiliation":[]},{"given":"Junxiong","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Xin","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yintang","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,6,30]]},"reference":[{"issue":"6","key":"1050_CR1","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1109\/MC.2011.187","volume":"44","author":"M Naphade","year":"2011","unstructured":"Naphade M, Banavar G, Harrison C et al (2011) Smarter cities and their innovation challenges. Computer 44(6):32\u201339","journal-title":"Computer"},{"issue":"6","key":"1050_CR2","first-page":"50","volume":"53","author":"P Mell","year":"2009","unstructured":"Mell P, Grance T (2009) The NIST definition of cloud computing. Natl Inst Standards Technol 53(6):50","journal-title":"Natl Inst Standards Technol"},{"key":"1050_CR3","doi-asserted-by":"crossref","unstructured":"Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. IEEE Symposium on Security and Privacy (SP 2007): 321\u2013334","DOI":"10.1109\/SP.2007.11"},{"key":"1050_CR4","first-page":"195","volume":"2007","author":"R Ostrovsky","year":"2007","unstructured":"Ostrovsky R, Sahai A, Waters B (2007) Attribute-based encryption with non-monotonic access structures. Proc CCS 2007:195\u2013203","journal-title":"Proc CCS"},{"issue":"3","key":"1050_CR5","doi-asserted-by":"crossref","first-page":"309","DOI":"10.1145\/937503.937506","volume":"35","author":"S Rafaeli","year":"2003","unstructured":"Rafaeli S, Hutchison D (2003) A survey of key management for secure group communication. ACM Comput Surv (CSUR) 35(3):309\u2013329","journal-title":"ACM Comput Surv (CSUR)"},{"key":"1050_CR6","doi-asserted-by":"crossref","first-page":"1","DOI":"10.5465\/ambpp.2007.26523456","volume":"2007","author":"X Boyen","year":"2007","unstructured":"Boyen X, Waters B (2007) Full-domain subgroup hiding and constant-size group signatures. Proc PKC 2007:1\u201315","journal-title":"Proc PKC"},{"key":"1050_CR7","doi-asserted-by":"crossref","unstructured":"Attrapadung N, Imai H (2009) Conjunctive broadcast and attribute-based encryption. International Conference on Pairing-Based Cryptography: 248-265","DOI":"10.1007\/978-3-642-03298-1_16"},{"key":"1050_CR8","doi-asserted-by":"crossref","unstructured":"Attrapadung N, Imai H (2009) Attribute-based encryption supporting direct\/indirect revocation modes. IMA International Conference on Cryptography and Coding: 278-300","DOI":"10.1007\/978-3-642-10868-6_17"},{"key":"1050_CR9","first-page":"321","volume":"2008","author":"X Liang","year":"2010","unstructured":"Liang X, Lu R, Lin X, Shen X (2010) Ciphertext policy attribute-based encryption with efficient revocation. IEEE Symp Secur Priv 2008:321\u2013334","journal-title":"IEEE Symp Secur Priv"},{"key":"1050_CR10","doi-asserted-by":"crossref","unstructured":"Li M, Huang X, Liu J K et al (2014) GO-ABE: group-oriented attribute-based encryption. International Conference on Network and System Security: 260-270.","DOI":"10.1007\/978-3-319-11698-3_20"},{"issue":"5","key":"1050_CR11","doi-asserted-by":"crossref","first-page":"799","DOI":"10.3233\/JCS-2009-0383","volume":"18","author":"M Pirretti","year":"2010","unstructured":"Pirretti M, Traynor P, McDaniel P, Waters B (2010) Secure attribute-based systems. J Comput Secur 18(5):799\u2013837","journal-title":"J Comput Secur"},{"key":"1050_CR12","doi-asserted-by":"crossref","unstructured":"Ibraimi L, Petkovic M, Nikova S et al (2009) Mediated Ciphertext-policy attribute-based encryption and its application. Information Security Applications: 309\u2013323","DOI":"10.1007\/978-3-642-10838-9_23"},{"key":"1050_CR13","doi-asserted-by":"crossref","unstructured":"Yu S, Wang C, Ren K, et al (2010) Attribute based data sharing with attribute revocation. Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security: 261-270","DOI":"10.1145\/1755688.1755720"},{"issue":"7","key":"1050_CR14","doi-asserted-by":"crossref","first-page":"1214","DOI":"10.1109\/TPDS.2010.203","volume":"22","author":"J Hur","year":"2010","unstructured":"Hur J, Noh D (2010) Attribute-based access control with efficient revocation in data outsourcing systems. IEEE Trans Parallel Distrib Syst 22(7):1214\u20131221","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"1050_CR15","doi-asserted-by":"crossref","unstructured":"Xie X, Ma H, Li J et al (2013) New ciphertext-policy attribute-based access control with efficient revocation. Information and Communication Technology-EurAsia Conference: 373-382","DOI":"10.1007\/978-3-642-36818-9_41"},{"key":"1050_CR16","doi-asserted-by":"crossref","unstructured":"Liang K, Au M H, Susilo W et al (2014) An adaptively CCA-secure ciphertext-policy attribute-based proxy re-encryption for cloud data sharing. International Conference on Information Security Practice and Experience: 448-461","DOI":"10.1007\/978-3-319-06320-1_33"},{"key":"1050_CR17","doi-asserted-by":"crossref","unstructured":"Liang K, Liu J K, Wong D S et al (2014) An efficient cloud-based revocable identity-based proxy re-encryption scheme for public clouds data sharing. European Symposium on Research in Computer Security. Springer International Publishing: 257-272","DOI":"10.1007\/978-3-319-11203-9_15"},{"issue":"10","key":"1050_CR18","doi-asserted-by":"crossref","first-page":"1667","DOI":"10.1109\/TIFS.2014.2346023","volume":"9","author":"K Liang","year":"2014","unstructured":"Liang K, Au MH, Liu JK et al (2014) A DFA-based functional proxy re-encryption scheme for secure public cloud data sharing. IEEE Trans Inf Forensics Secur 9(10):1667\u20131680","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"1050_CR19","doi-asserted-by":"crossref","unstructured":"Yang Y, Liu J K, Liang K et al (2015) Extended proxy-assisted approach: achieving revocable fine-grained encryption of cloud data. European Symposium on Research in Computer Security (ESORICS (2)): 146-166","DOI":"10.1007\/978-3-319-24177-7_8"},{"issue":"10","key":"1050_CR20","doi-asserted-by":"crossref","first-page":"2778","DOI":"10.1093\/comjnl\/bxv050","volume":"58","author":"K Liang","year":"2015","unstructured":"Liang K, Susilo W, Liu JK et al (2015) Efficient and fully CCA secure conditional proxy re-encryption from hierarchical identity-based encryption. Comput J 58(10):2778\u20132792","journal-title":"Comput J"},{"key":"1050_CR21","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1016\/j.future.2014.11.016","volume":"52","author":"K Liang","year":"2015","unstructured":"Liang K, Au MH, Liu JK et al (2015) A secure and efficient ciphertext-policy attribute-based proxy re-encryption for cloud data sharing. Futur Gener Comput Syst 52:95\u2013108","journal-title":"Futur Gener Comput Syst"},{"key":"1050_CR22","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1016\/j.tcs.2016.08.023","volume":"652","author":"K He","year":"2016","unstructured":"He K, Weng J, Deng RH et al (2016) On the security of two identity-based conditional proxy re-encryption schemes. Theor Comput Sci 652:18\u201327","journal-title":"Theor Comput Sci"},{"key":"1050_CR23","unstructured":"Beimel A (1996) Secure schemes for secret sharing and key distribution. Technion-Israel Inst Technol Fac Comput Sci"},{"key":"1050_CR24","doi-asserted-by":"crossref","unstructured":"Waters B (2011) Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. International Workshop on Public Key Cryptography: 53-70","DOI":"10.1007\/978-3-642-19379-8_4"},{"key":"1050_CR25","first-page":"568","volume":"2011","author":"A Lewko","year":"2011","unstructured":"Lewko A, Waters B (2011) Decentralizing attribute-based encryption. Proc Adv Cryptology\u2013EUROCRYPT 2011:568\u2013588","journal-title":"Proc Adv Cryptology\u2013EUROCRYPT"},{"key":"1050_CR26","doi-asserted-by":"crossref","unstructured":"Chase M (2007) Multi-authority attribute based encryption. Proceedings of Theory of Cryptography: 515-534","DOI":"10.1007\/978-3-540-70936-7_28"},{"key":"1050_CR27","first-page":"91","volume":"2011","author":"S Ruj","year":"2011","unstructured":"Ruj S, Nayak A, Stojmenovic I (2011) DACC: distributed access control in clouds. Proc Trust Com 2011:91\u201398","journal-title":"Proc Trust Com"},{"issue":"2","key":"1050_CR28","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1007\/s13389-013-0057-3","volume":"3","author":"J Akinyele","year":"2013","unstructured":"Akinyele J, Garman C, Miers I et al (2013) Charm: a framework for rapidly prototyping cryptosystems. J Cryptogr Eng 3(2):111\u2013128","journal-title":"J Cryptogr Eng"},{"key":"1050_CR29","unstructured":"Lynn B. PBC Library: the pairing-based cryptography library. http:\/\/crypto.stanford.edu\/pbc . Accessed 26 Jul 2016."},{"key":"1050_CR30","unstructured":"Charm: a tool for rapid cryptographic prototyping. http:\/\/www.charm-crypto.com . Accessed 26 Jul 2016."}],"container-title":["Personal and Ubiquitous Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00779-017-1050-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-017-1050-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-017-1050-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,27]],"date-time":"2019-09-27T16:57:37Z","timestamp":1569603457000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00779-017-1050-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6,30]]},"references-count":30,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2017,10]]}},"alternative-id":["1050"],"URL":"https:\/\/doi.org\/10.1007\/s00779-017-1050-0","relation":{},"ISSN":["1617-4909","1617-4917"],"issn-type":[{"value":"1617-4909","type":"print"},{"value":"1617-4917","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,6,30]]}}}