{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T16:06:03Z","timestamp":1774541163207,"version":"3.50.1"},"reference-count":14,"publisher":"Tech Science Press","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.32604\/iasc.2023.032267","type":"journal-article","created":{"date-parts":[[2022,8,18]],"date-time":"2022-08-18T06:02:31Z","timestamp":1660802551000},"page":"3801-3813","source":"Crossref","is-referenced-by-count":6,"title":["Dynamic Time and Location Information in Ciphertext-Policy Attribute-Based Encryption with Multi-Authorization"],"prefix":"10.32604","volume":"35","author":[{"given":"P.","family":"Prathap Nayudu","sequence":"first","affiliation":[]},{"given":"Krovi","family":"Raja Sekhar","sequence":"additional","affiliation":[]}],"member":"17807","reference":[{"key":"ref1","series-title":"2017 Int. Conf. on Energy, Communication, Data Analytics and Soft Computing (ICECDS)","first-page":"3604","article-title":"Data security in cloud","author":"Lalitha","year":"2017"},{"key":"ref2","series-title":"2019 IEEE 12th Int. Conf. on Cloud Computing (CLOUD)","first-page":"251","article-title":"Finding risk patterns in cloud system models","author":"Kunz","year":"2019"},{"key":"ref3","series-title":"2016 Int. Conf. on Computing Communication Control and Automation (ICCUBEA)","first-page":"1","article-title":"Framework for security of shared data in cloud environment","author":"Shaikh","year":"2016"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"220","DOI":"10.23919\/JCC.2020.08.018","article-title":"Research on multi-authority CP-ABE access control model in multicloud","volume":"17","author":"Zhou","year":"2020","journal-title":"China Communications"},{"key":"ref5","series-title":"2021 Int. Conf. on Information and Communication Technology Convergence (ICTC)","first-page":"1371","article-title":"Data encryption method using CP-ABE with symmetric key algorithm in blockchain network","author":"Lee","year":"2021"},{"key":"ref6","series-title":"2019 Int. Conf. on Communication and Signal Processing (ICCSP)","first-page":"0501","article-title":"Pairing-free CP-ABE based cryptography combined with steganography for multimedia applications","author":"Reshma","year":"2019"},{"key":"ref7","series-title":"2015 IEEE Int. Conf. on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing","first-page":"343","article-title":"Efficient CP-ABE attribute\/key management for iot applications","author":"Touati","year":"2015"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"1683","DOI":"10.1007\/s10586-020-03114-1","article-title":"Secure data transmission on a distributed cloud server with the help of HMCA and data encryption using optimized CP-ABE-ECC","volume":"23","author":"Vengala","year":"2020","journal-title":"Cluster Computing"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"1041","DOI":"10.1007\/s00607-018-0637-2","article-title":"An efficient and revocable storage CP-ABE scheme in the cloud computing","volume":"101","author":"Zhao","year":"2019","journal-title":"Computing"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"342","DOI":"10.3103\/S0146411619040114","article-title":"Security protection of system sharing data with improved CP-ABE encryption algorithm under cloud computing environment","volume":"53","author":"Xue","year":"2019","journal-title":"Automatic Control and Computer Sciences"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"2693","DOI":"10.1007\/s12652-018-0967-0","article-title":"A new verifiable outsourced ciphertext-policy attribute based encryption for big data privacy and access control in cloud","volume":"10","author":"Premkamal","year":"2019","journal-title":"Journal of Ambient Intelligence and Humanized Computing"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s13673-020-00255-5","article-title":"An efficient attribute-based hierarchical data access control scheme in cloud computing","volume":"10","author":"He","year":"2020","journal-title":"Human-centric Computing and Information Sciences"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"27336","DOI":"10.1109\/ACCESS.2018.2836350","article-title":"A novel efficient pairing-free CP-ABE based on elliptic curve cryptography for IoT","volume":"6","author":"Ding","year":"2016","journal-title":"IEEE Access"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"6040","DOI":"10.1007\/s11227-019-03119-7","article-title":"An attribute-based lightweight cloud data access control using hypergraph structure","volume":"76","author":"Mythili","year":"2020","journal-title":"The Journal of Supercomputing"}],"container-title":["Intelligent Automation &amp; Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.techscience.com\/ueditor\/files\/iasc\/TSP_IASC-35-3\/TSP_IASC_32267\/TSP_IASC_32267.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,6]],"date-time":"2024-12-06T21:31:37Z","timestamp":1733520697000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/iasc\/v35n3\/49427"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"references-count":14,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2023]]}},"URL":"https:\/\/doi.org\/10.32604\/iasc.2023.032267","relation":{},"ISSN":["1079-8587"],"issn-type":[{"value":"1079-8587","type":"print"}],"subject":[],"published":{"date-parts":[[2023]]}}}