{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T03:11:45Z","timestamp":1774926705194,"version":"3.50.1"},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,3]]},"DOI":"10.1109\/infcom.2010.5462174","type":"proceedings-article","created":{"date-parts":[[2010,5,12]],"date-time":"2010-05-12T16:54:40Z","timestamp":1273683280000},"page":"1-9","source":"Crossref","is-referenced-by-count":884,"title":["Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing"],"prefix":"10.1109","author":[{"given":"Shucheng","family":"Yu","sequence":"first","affiliation":[]},{"given":"Cong","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Kui","family":"Ren","sequence":"additional","affiliation":[]},{"given":"Wenjing","family":"Lou","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Computer Security Technology Planning Study","author":"anderson","year":"1972","journal-title":"Report ESD-TR-73&#x2013;51"},{"key":"ref11","article-title":"Scalable secure file sharing on untrusted storage","author":"kallahalla","year":"2003","journal-title":"Proc of FAST'03"},{"key":"ref12","article-title":"Sirius: Securing remote untrusted storage","author":"goh","year":"2003","journal-title":"Proc of NDSS'03"},{"key":"ref13","article-title":"Improved proxy re-encryption schemes with applications to secure distributed storage","author":"ateniese","year":"2005","journal-title":"Proc of NDSS'05"},{"key":"ref14","article-title":"Over-encryption: Management of access control evolution on outsourced data","author":"di vimercati","year":"2007","journal-title":"Proc of VLDB'07"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180418"},{"key":"ref16","doi-asserted-by":"crossref","DOI":"10.1007\/BFb0054122","article-title":"Divertible protocols and atomic proxy cryptography","author":"blaze","year":"1998","journal-title":"Proc of Eurocrypt'98"},{"key":"ref17","article-title":"Enabling public verifiability and data dynamics for storage security in cloud computing","author":"wang","year":"2009","journal-title":"Proc of ESORICS'09"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/GCE.2008.4738443"},{"key":"ref19","article-title":"Defending against key abuse attacks in kp-abe enabled broadcast systems","author":"yu","year":"2009","journal-title":"Proc SecureComm'09"},{"key":"ref4","year":"0"},{"key":"ref3","year":"0"},{"key":"ref6","article-title":"Principles of policy in secure groups","author":"harney","year":"2001","journal-title":"Proc of NDSS'01"},{"key":"ref5","year":"1996","journal-title":"Health Insurance Portability Accountability Act of 1996 (HIPAA)"},{"key":"ref8","article-title":"A unified scheme for resource protection in automated trust negotiation","author":"yu","year":"2003","journal-title":"Proc SPIE '03"},{"key":"ref7","article-title":"Methods and limitations of security policy reconciliation","author":"mcdaniel","year":"2002","journal-title":"Proc SPIE '02"},{"key":"ref2","year":"0"},{"key":"ref1","article-title":"Above the clouds: A berkeley view of cloud computing","author":"armbrust","year":"2009","journal-title":"Tech Rep USB-EECS-2009&#x2013;28"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1102120.1102129"},{"key":"ref20","article-title":"The optimality of a fast CNF conversion and its use with SAT","author":"sheridan","year":"2004","journal-title":"Proc SAT'04"},{"key":"ref22","doi-asserted-by":"crossref","DOI":"10.1145\/1102120.1102147","article-title":"Dynamic and efficient key management for access hierarchies","author":"atallah","year":"2005","journal-title":"Proc of CCS'05"},{"key":"ref21","article-title":"Revocation and tracing schemes for stateless receivers","author":"naor","year":"2001","journal-title":"Proc of CRYPTO'01"}],"event":{"name":"IEEE INFOCOM 2010 - IEEE Conference on Computer Communications","location":"San Diego, CA, USA","start":{"date-parts":[[2010,3,14]]},"end":{"date-parts":[[2010,3,19]]}},"container-title":["2010 Proceedings IEEE INFOCOM"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5461675\/5461899\/05462174.pdf?arnumber=5462174","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T04:08:03Z","timestamp":1497845283000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5462174\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,3]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/infcom.2010.5462174","relation":{},"subject":[],"published":{"date-parts":[[2010,3]]}}}