{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T13:36:52Z","timestamp":1730209012723,"version":"3.28.0"},"reference-count":32,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,5]]},"DOI":"10.1109\/cns.2018.8433128","type":"proceedings-article","created":{"date-parts":[[2018,8,13]],"date-time":"2018-08-13T22:09:06Z","timestamp":1534198146000},"page":"1-9","source":"Crossref","is-referenced-by-count":3,"title":["Achieving Fine-Grained Access Control with Discretionary User Revocation over Cloud Data"],"prefix":"10.1109","author":[{"given":"Qiuxiang","family":"Dong","sequence":"first","affiliation":[]},{"given":"Dijiang","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Jim","family":"Luo","sequence":"additional","affiliation":[]},{"given":"Myong","family":"Kang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2017.71"},{"key":"ref31","first-page":"729","article-title":"Fuzzy keyword search over encrypted data in the public key setting","author":"dong","year":"2013","journal-title":"international conference on web-age information management"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICPADS.2015.45"},{"journal-title":"Ciphertext-Policy Attribute-Based Encryption An Expressive Efficient and Provably Secure Realization","year":"0","author":"waters","key":"ref10"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1007\/978-3-642-19379-8_4","article-title":"Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization","author":"waters","year":"2011","journal-title":"Public Key Cryptography PKC 2011"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2046614.2046628"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"1343","DOI":"10.1109\/TIFS.2013.2271848","article-title":"Attribute-based encryption with verifiable outsourced decryption","volume":"8","author":"lai","year":"2013","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-013-0057-3"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2014.6997508"},{"journal-title":"The pairing-based cryptography library","year":"2006","author":"lynn","key":"ref16"},{"key":"ref17","first-page":"480","author":"fiat","year":"1993","journal-title":"Broadcast encryption"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1007\/3-540-44647-8_3","article-title":"Revocation and tracing schemes for stateless receivers","author":"naor","year":"2001","journal-title":"Advances in CryptologyCRYPTO 2001"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180418"},{"key":"ref28","first-page":"123","article-title":"Mining misinformation in social media","author":"wu","year":"2016","journal-title":"Big Data of Complex Networks"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2009.09.009"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ASONAM.2016.7752287"},{"key":"ref3","first-page":"321","article-title":"Ciphertext-policy attributebased encryption","author":"bethencourt","year":"2007","journal-title":"IEEE SP&#x2019;07"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2484313.2484383"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/2983323.2983697"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2010.203"},{"journal-title":"Tracing fake-news footprints Characterizing social media messages by how they propagate","year":"2018","author":"wu","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462174"},{"journal-title":"Another amazon aws cloud data leak 4m time warner customer records exposed","year":"0","author":"panettieri","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.23"},{"journal-title":"Hacked dropbox login data of 68 million users is now for sale on the dark web","year":"0","author":"turner","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.97"},{"key":"ref22","first-page":"248","article-title":"Conjunctive broadcast and attribute-based encryption","volume":"5671","author":"attrapadung","year":"2009","journal-title":"Pairing"},{"key":"ref21","first-page":"39","article-title":"Attribute-based content distribution with hidden policy","author":"yu","year":"2008","journal-title":"Secure Network Protocols 2008 NPSec 2008 4th Workshop on"},{"key":"ref24","first-page":"275","article-title":"A framework and compact constructions for non-monotonic attribute-based encryption","author":"yamada","year":"2014","journal-title":"Workshop on Public Key Cryptography"},{"key":"ref23","first-page":"195","article-title":"Attribute-based encryption with non-monotonic access structures","author":"ostrovsky","year":"2007","journal-title":"Proceedings of the 14th ACM conference on Computer and Communications Security"},{"journal-title":"Toward relational learning with misinformation","year":"0","author":"liang","key":"ref26"},{"key":"ref25","first-page":"319","article-title":"Adaptive spammer detection with sparse group modeling","author":"liang","year":"2017","journal-title":"ICWSM"}],"event":{"name":"2018 IEEE Conference on Communications and Network Security (CNS)","start":{"date-parts":[[2018,5,30]]},"location":"Beijing","end":{"date-parts":[[2018,6,1]]}},"container-title":["2018 IEEE Conference on Communications and Network Security (CNS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8410986\/8433121\/08433128.pdf?arnumber=8433128","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,28]],"date-time":"2022-01-28T22:25:44Z","timestamp":1643408744000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8433128\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/cns.2018.8433128","relation":{},"subject":[],"published":{"date-parts":[[2018,5]]}}}