Zobrazeno 1 - 10
of 728
pro vyhledávání: '"ciphertext policy"'
An Efficient Pairing-Free Ciphertext-Policy Attribute-Based Encryption Scheme for Internet of Things
Publikováno v:
Sensors, Vol 24, Iss 21, p 6843 (2024)
The Internet of Things (IoT) is a heterogeneous network composed of numerous dynamically connected devices. While it brings convenience, the IoT also faces serious challenges in data security. Ciphertext-policy attribute-based encryption (CP-ABE) is
Externí odkaz:
https://doaj.org/article/4ac5f464d27d44c694ffc425141ee900
Publikováno v:
ISPRS International Journal of Geo-Information, Vol 13, Iss 9, p 321 (2024)
Satellite service systems transfer data from satellite providers to the big data industry, which includes data traders and data analytics companies. This system needs to provide access to numerous users whose specific identities are unknown. Cipherte
Externí odkaz:
https://doaj.org/article/083a2a9e167b454185dc41d75f9c23cb
Publikováno v:
Journal of Cloud Computing: Advances, Systems and Applications, Vol 12, Iss 1, Pp 1-13 (2023)
Abstract Personal health record (PHR) is a medical model in which patients can upload their medical records and define the access control by themselves. Since the limited local storage and the development of cloud computing, many PHR services have be
Externí odkaz:
https://doaj.org/article/a3022f214ca74daaac3fcad46fbe7938
Publikováno v:
Journal of King Saud University: Computer and Information Sciences, Vol 35, Iss 8, Pp 101658- (2023)
Ciphertext-policy attribute based encryption(CP-ABE) is widely used to protect data and privacy security in data sharing because of its fine-grained access control. However, due to the rapid development of the Internet and the explosive growth of all
Externí odkaz:
https://doaj.org/article/2a52ed171d2b4d4aba4562fe91d48183
Enabling Access Control for Encrypted Multi-Dimensional Data in Cloud Computing through Range Search
Publikováno v:
Tehnički Vjesnik, Vol 30, Iss 6, Pp 1704-1716 (2023)
With the growing popularity of cloud computing, data owners are increasingly opting to outsource their data to cloud servers due to the numerous benefits it offers. However, this outsourcing raises concerns about data privacy since the data stored on
Externí odkaz:
https://doaj.org/article/4a97a6ed75bc4c9296c54b21466ba0d0
Publikováno v:
Jisuanji kexue, Vol 49, Iss 10, Pp 327-334 (2022)
Ciphertext-policy attribute-based encryption(CP-ABE) can be used to realize secure data sharing in cloud computing environments.However,user attribute change(attribute revocation and addition) in CP-ABE is a tricky problem.Generally,attribute change
Externí odkaz:
https://doaj.org/article/db03803bfd8d4fdaae40f99edb50b441
Publikováno v:
International Journal of Interactive Multimedia and Artificial Intelligence, Vol 7, Iss 5, Pp 66-75 (2022)
The integration of agricultural Internet of Things (IoT) and blockchain has become the key technology of precision agriculture. How to protect data privacy and security from data source is one of the difficult issues in agricultural IoT research. Thi
Externí odkaz:
https://doaj.org/article/0439803b77ba474184c03ce1df28cc09
Autor:
Wei Liu, Nurmamat Helil
Publikováno v:
Mathematics, Vol 12, Iss 2, p 259 (2024)
In ciphertext-policy attribute-based encryption, there might be different levels of overlapping in the access policies of different data objects outsourced by the same data owner. This paper proposes a soft set decision-making method and cluster perc
Externí odkaz:
https://doaj.org/article/5f5c43a592c7493b9d6d2d25403ca962
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.