Results 221 to 230 of about 18,941 (248)
Some of the next articles are maybe not open access.
An attribute based encryption scheme with fine-grained attribute revocation
2012 IEEE Global Communications Conference (GLOBECOM), 2012As a new public key primitive, attribute-based encryption (ABE) is envisioned to be a promising tool for implementing fine-grained access control. When applying ABE schemes to practical applications, revocation mechanism is very necessary for any ABE schemes involving many users.
null Qiang Li +2 more
openaire +1 more source
Dual Revocation: Attribute and User Revocation Based On CPABE In Cloud Computing
2019 International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), 2019Access Control models are required to secure Cloud Computing from unauthorized access. As an efficient cryptographic tool, Ciphertext Policy Attribute Based Encryption offers a fine-grained access to user assets. But, revocation operation presents a major brake in the implementation of this algorithm.
Mariem Bouchaala +2 more
openaire +1 more source
Permanent Revocation in Attribute Based Broadcast Encryption
2012 International Conference on Cyber Security, 2012We propose a new and efficient scheme for broadcast encryption. A broadcast encryption system allows a broadcaster to send an encrypted message to a dynamically chosen subset RS, |RS|=n, of a given set of users, such that only users in this subset can decrypt the message.
Shlomi Dolev +2 more
openaire +1 more source
Scalable and Revocable Attribute-Based Data Sharing With Short Revocation List for IIoT
IEEE Internet of Things Journal, 2023The cooperative works between connected smart devices in the Industrial Internet of Things (IIoT) have greatly made the growth in productivity and economics for the conventional industry. However, due to the introduction of the communication network, the budding IIoT also confronts the unprecedented cyber threats.
Jun Feng +4 more
openaire +2 more sources
Revocation in an Attribute-Based Delegation Model
2008 International Conference on Networking, Architecture, and Storage, 2008Attribute-based delegation model (ABDM) is a secured and flexible delegation model with an extended delegation constraint. Delegation attribute expressions can be changed in delegation, which induces an automatic revocation in ABDM. In this revocation, delegated permissions can be removed from users automatically according to dominance relation among ...
Chunxiao Ye +3 more
openaire +1 more source
Towards Attribute Revocation in Key-Policy Attribute Based Encryption
2011Attribute revocation is important to the attribute-based encryption (ABE). The existing ABE schemes supporting revocation mainly focus on the revocation of the user's identity, which could only revoke the user's whole attributes by revoking the user's identity.
Pengpian Wang, Dengguo Feng, Liwu Zhang
openaire +1 more source
Hidden attribute-based signatures without anonymity revocation
Information Sciences, 2010zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Li, J, Kim, K Kim, Kwangjo
openaire +2 more sources
Revocable Attribute-Based Data Storage in Mobile Clouds
IEEE Transactions on Services Computing, 2022It is becoming fashionable for people to access data outsourced to clouds with mobile devices. To protect data security and privacy, attribute-based encryption (ABE) has been widely used in cloud storage systems. However, one of the main efficiency drawbacks of ABE is the high computation overheads at mobile devices during user revocation and file ...
Hua Deng +4 more
openaire +1 more source
Study on attribute-based revocation in delegation
IET Conference on Wireless, Mobile and Sensor Networks 2007 (CCWMSN07), 2007In ABDM, revocation focus on how to revoke those delegated roles or permissions. Considering the characteristics of delegation operation in ABDM, this paper proposes two novel different revocations: revocation triggered by the change of user's delegation attribute expression and revocation triggered by the change of delegation permission's delegation ...
null Chunxiao Ye +3 more
openaire +1 more source
Efficient attribute-based encryption with attribute revocation for assured data deletion
Information Sciences, 2019zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Liang Xue +5 more
openaire +3 more sources

