Results 221 to 230 of about 18,941 (248)
Some of the next articles are maybe not open access.

An attribute based encryption scheme with fine-grained attribute revocation

2012 IEEE Global Communications Conference (GLOBECOM), 2012
As a new public key primitive, attribute-based encryption (ABE) is envisioned to be a promising tool for implementing fine-grained access control. When applying ABE schemes to practical applications, revocation mechanism is very necessary for any ABE schemes involving many users.
null Qiang Li   +2 more
openaire   +1 more source

Dual Revocation: Attribute and User Revocation Based On CPABE In Cloud Computing

2019 International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), 2019
Access Control models are required to secure Cloud Computing from unauthorized access. As an efficient cryptographic tool, Ciphertext Policy Attribute Based Encryption offers a fine-grained access to user assets. But, revocation operation presents a major brake in the implementation of this algorithm.
Mariem Bouchaala   +2 more
openaire   +1 more source

Permanent Revocation in Attribute Based Broadcast Encryption

2012 International Conference on Cyber Security, 2012
We propose a new and efficient scheme for broadcast encryption. A broadcast encryption system allows a broadcaster to send an encrypted message to a dynamically chosen subset RS, |RS|=n, of a given set of users, such that only users in this subset can decrypt the message.
Shlomi Dolev   +2 more
openaire   +1 more source

Scalable and Revocable Attribute-Based Data Sharing With Short Revocation List for IIoT

IEEE Internet of Things Journal, 2023
The cooperative works between connected smart devices in the Industrial Internet of Things (IIoT) have greatly made the growth in productivity and economics for the conventional industry. However, due to the introduction of the communication network, the budding IIoT also confronts the unprecedented cyber threats.
Jun Feng   +4 more
openaire   +2 more sources

Revocation in an Attribute-Based Delegation Model

2008 International Conference on Networking, Architecture, and Storage, 2008
Attribute-based delegation model (ABDM) is a secured and flexible delegation model with an extended delegation constraint. Delegation attribute expressions can be changed in delegation, which induces an automatic revocation in ABDM. In this revocation, delegated permissions can be removed from users automatically according to dominance relation among ...
Chunxiao Ye   +3 more
openaire   +1 more source

Towards Attribute Revocation in Key-Policy Attribute Based Encryption

2011
Attribute revocation is important to the attribute-based encryption (ABE). The existing ABE schemes supporting revocation mainly focus on the revocation of the user's identity, which could only revoke the user's whole attributes by revoking the user's identity.
Pengpian Wang, Dengguo Feng, Liwu Zhang
openaire   +1 more source

Hidden attribute-based signatures without anonymity revocation

Information Sciences, 2010
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Li, J, Kim, K Kim, Kwangjo
openaire   +2 more sources

Revocable Attribute-Based Data Storage in Mobile Clouds

IEEE Transactions on Services Computing, 2022
It is becoming fashionable for people to access data outsourced to clouds with mobile devices. To protect data security and privacy, attribute-based encryption (ABE) has been widely used in cloud storage systems. However, one of the main efficiency drawbacks of ABE is the high computation overheads at mobile devices during user revocation and file ...
Hua Deng   +4 more
openaire   +1 more source

Study on attribute-based revocation in delegation

IET Conference on Wireless, Mobile and Sensor Networks 2007 (CCWMSN07), 2007
In ABDM, revocation focus on how to revoke those delegated roles or permissions. Considering the characteristics of delegation operation in ABDM, this paper proposes two novel different revocations: revocation triggered by the change of user's delegation attribute expression and revocation triggered by the change of delegation permission's delegation ...
null Chunxiao Ye   +3 more
openaire   +1 more source

Efficient attribute-based encryption with attribute revocation for assured data deletion

Information Sciences, 2019
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Liang Xue   +5 more
openaire   +3 more sources

Home - About - Disclaimer - Privacy