相关期刊:《Cybersecurity》《Computers, Materials & Continua》《International Journal of Communications, Network and System Sciences》《Journal of Southeast University(English Edition)》更多>>
supported in part by the National Natural Science Foundation of China(No.61702067);in part by the Natural Science Foundation of Chongqing(No.cstc2020jcyj-msxmX0343).
Zero trust architecture is an end-to-end approach for server resources and data security which contains identity authentication,access control,dynamic evaluation,and so on.This work focuses on authentication technolog...
funded by a National Social Science Fund titled“Research on International Law of Free Trade Port With Chinese Characteristics”(No.20&ZD 205).
In this article,the authors take Shanghai City as the representative region and retrieve 48 cases related to applications for the revocation of foreign-related arbitration awards through tools such as China Judgments ...
This research was funded by the National Natural Science Foundation of China,Grant Number 62162039;the Shaanxi Provincial Key R&D Program,China with Grant Number 2020GY-041.
The Access control scheme is an effective method to protect user data privacy.The access control scheme based on blockchain and ciphertext policy attribute encryption(CP–ABE)can solve the problems of single—point of...
This work was supported by National Natural Science Foundation of China(Nos.62172411,62172404,61972094)。
Personally identifiable information(PII)refers to any information that links to an individual.Sharing PII is extremely useful in public affairs yet hard to implement due to the worries about privacy violations.Buildin...
supported by National Key Research and Development Program of China(Grant No.2021YFB3101100);National Natural Science Foundation of China(Grant Nos.61902290,62072352);Key Research and Development Program of Shaanxi(Grant Nos.2020ZDLGY09-06,2019ZDLGY12-04);Guangxi Key Laboratory of Trusted Software(Grant No.kx202004)。
With the rapid deployment of storage services,secure and efficient user authorization and revocation data shared through the cloud have become a grand challenge hindering cloud data applications.When previous direct a...
The work is supported by the National Key Research and Development Program of China(No.2018YFC1604002);the National Natural Science Foundation of China(No.U1836204,No.U1936208,No.U1936216,No.62002197).
Progress in cloud computing makes group data sharing in outsourced storage a reality.People join in group and share data with each other,making team work more convenient.This new application scenario also faces data s...
supported by the National Key Research and Development Program of China(2018YFC0604502);the Funding Project for the Young Backbone Teachers of Higher Education Institutions in Henan Province(2019GGJS061)。
Sharing of the electronic medical records among different hospitals raises serious concern of the leakage of individual privacy for the adoption of the semi trustworthiness of the medical cloud platform.The tracking a...
Cloud storage is a service involving cloud service providers providingstorage space to customers. Cloud storage services have numerous advantages,including convenience, high computation, and capacity, thereby attracti...
This work supports in part by National Key R&D Program of China(No.2018YFB2100400);National Science Foundation of China(No.61872100);Industrial Internet Innovation and Development Project of China(2019);State Grid Corporation of China Co.,Ltd.technology project(No.5700-202019187A-0-0-00).
Delegation mechanism in Internet of Things(IoT)allows users to share some of their permissions with others.Cloud-based delegation solutions require that only the user who has registered in the cloud can be delegated p...
supported by National Natural Science Foundation of China(Grant Nos.61872359,61936008).
Dear editor,Group signature(GS)[1]is a milestone in privacy-oriented cryptography,which provides authentication for messages and keeps signers anonymous.Trolin and Wikstr¨om[2]properly generalized GS into the notion ...