Provably Secure Role-Based Encryption with Revocation Mechanism
- 11 July 2011
- journal article
- Published by Springer Science and Business Media LLC in Journal of Computer Science and Technology
- Vol. 26 (4), 697-710
- https://doi.org/10.1007/s11390-011-1169-9
Abstract
No abstract availableKeywords
This publication has 34 references indexed in Scilit:
- Attribute-Based Signature with Policy-and-Endorsement MechanismJournal of Computer Science and Technology, 2010
- How to construct identity-based signatures without the key escrow problemInternational Journal of Information Security, 2010
- Dual-Policy Attribute Based Encryption: Simultaneous Access Control with Ciphertext and Key PoliciesIEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2010
- Towards secure dynamic collaborations with group-based RBAC modelComputers & Security, 2009
- Reducing Receiver's Storage in CS, SD and LSD Broadcast Encryption SchemesIEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2005
- Windows 2000 security: A postmortem analysisNetwork Security, 2004
- A time-bound cryptographic key assignment scheme for access control in a hierarchyIEEE Transactions on Knowledge and Data Engineering, 2002
- A fine-grained access control system for XML documentsACM Transactions on Information and System Security, 2002
- Secure group communications using key graphsACM SIGCOMM Computer Communication Review, 1998
- Cryptographic solution to a problem of access control in a hierarchyACM Transactions on Computer Systems, 1983