REVOCATION

作品数:56被引量:66H指数:4
导出分析报告
相关领域:自动化与计算机技术更多>>
相关机构:南京理工大学更多>>
相关期刊:《Cybersecurity》《Computers, Materials & Continua》《International Journal of Communications, Network and System Sciences》《Journal of Southeast University(English Edition)》更多>>
相关基金:国家自然科学基金国家高技术研究发展计划国家重点基础研究发展计划国家教育部博士点基金更多>>
-

检索结果分析

结果分析中...
条 记 录,以下是1-10
视图:
排序:
Privacy-preserving authentication scheme based on zero trust architecture
《Digital Communications and Networks》2024年第5期1211-1220,共10页Fei Tang Chunliang Ma Kefei Cheng 
supported in part by the National Natural Science Foundation of China(No.61702067);in part by the Natural Science Foundation of Chongqing(No.cstc2020jcyj-msxmX0343).
Zero trust architecture is an end-to-end approach for server resources and data security which contains identity authentication,access control,dynamic evaluation,and so on.This work focuses on authentication technolog...
关键词:Zero trust architecture PRIVACY-PRESERVING Authentication Anonymity revocation 
Research on the Revocation of Foreign-Related Arbitration Awards in Shanghai City
《US-China Law Review》2024年第4期146-153,共8页LI Xiaofu SHEN Ruoyan 
funded by a National Social Science Fund titled“Research on International Law of Free Trade Port With Chinese Characteristics”(No.20&ZD 205).
In this article,the authors take Shanghai City as the representative region and retrieve 48 cases related to applications for the revocation of foreign-related arbitration awards through tools such as China Judgments ...
关键词:foreign-related arbitration awards revocation dual track review Shanghai City 
A Blockchain and CP-ABE Based Access Control Scheme with Fine-Grained Revocation of Attributes in Cloud Health被引量:1
《Computers, Materials & Continua》2024年第2期2787-2811,共25页Ye Lu Tao Feng Chunyan Liu Wenbo Zhang 
This research was funded by the National Natural Science Foundation of China,Grant Number 62162039;the Shaanxi Provincial Key R&D Program,China with Grant Number 2020GY-041.
The Access control scheme is an effective method to protect user data privacy.The access control scheme based on blockchain and ciphertext policy attribute encryption(CP–ABE)can solve the problems of single—point of...
关键词:Blockchain access-control CP-ABE cloud health 
Rainbow:reliable personally identifiable information retrieval across multi-cloud
《Cybersecurity》2023年第4期88-108,共21页Zishuai Song Hui Ma Shuzhou Sun Yansen Xin Rui Zhang 
This work was supported by National Natural Science Foundation of China(Nos.62172411,62172404,61972094)。
Personally identifiable information(PII)refers to any information that links to an individual.Sharing PII is extremely useful in public affairs yet hard to implement due to the worries about privacy violations.Buildin...
关键词:Personally identifiable information Data privacy Flexible access control Reliable user revocation Verification 
Puncturable ciphertext-policy attribute-based encryption scheme for efficient and flexible user revocation被引量:1
《Science China(Information Sciences)》2023年第7期126-142,共17页Dilxat GHOPUR Jianfeng MA Xindi MA Yinbin MIAO Jialu HAO Tao JIANG 
supported by National Key Research and Development Program of China(Grant No.2021YFB3101100);National Natural Science Foundation of China(Grant Nos.61902290,62072352);Key Research and Development Program of Shaanxi(Grant Nos.2020ZDLGY09-06,2019ZDLGY12-04);Guangxi Key Laboratory of Trusted Software(Grant No.kx202004)。
With the rapid deployment of storage services,secure and efficient user authorization and revocation data shared through the cloud have become a grand challenge hindering cloud data applications.When previous direct a...
关键词:ciphertext-policy attribute-based encryption puncturable encryption user revocation outsource decryption digital signature 
Blockchain-based Privacy-Preserving Group Data Auditing with Secure User Revocation被引量:1
《Computer Systems Science & Engineering》2023年第4期183-199,共17页Yining Qi Yubo Luo Yongfeng Huang Xing Li 
The work is supported by the National Key Research and Development Program of China(No.2018YFC1604002);the National Natural Science Foundation of China(No.U1836204,No.U1936208,No.U1936216,No.62002197).
Progress in cloud computing makes group data sharing in outsourced storage a reality.People join in group and share data with each other,making team work more convenient.This new application scenario also faces data s...
关键词:Provable data possession data integrity blockchain ring signature 
Enhanced secure medical data sharing with traceable and direct revocation
《The Journal of China Universities of Posts and Telecommunications》2023年第1期66-79,共14页Peng Weiping Cui Shuang Song Cheng Han Ning 
supported by the National Key Research and Development Program of China(2018YFC0604502);the Funding Project for the Young Backbone Teachers of Higher Education Institutions in Henan Province(2019GGJS061)。
Sharing of the electronic medical records among different hospitals raises serious concern of the leakage of individual privacy for the adoption of the semi trustworthiness of the medical cloud platform.The tracking a...
关键词:MEDICAL data SHARING electronic MEDICAL RECORDS tracking and REVOCATION PRIVACY protection 
Hybrid Cloud Security by Revocable KUNodes-Storage with Identity-Based Encryption
《Computer Systems Science & Engineering》2022年第12期985-996,共12页S.Saravanakumar S.Chitra 
Cloud storage is a service involving cloud service providers providingstorage space to customers. Cloud storage services have numerous advantages,including convenience, high computation, and capacity, thereby attracti...
关键词:Cloud computing storage identification based revocation attribute based access control encryption DECRYPTION 
A Traceable Capability-based Access Control for IoT
《Computers, Materials & Continua》2022年第9期4967-4982,共16页Chao Li Fan Li Cheng Huang Lihua Yin Tianjie Luo Bin Wang 
This work supports in part by National Key R&D Program of China(No.2018YFB2100400);National Science Foundation of China(No.61872100);Industrial Internet Innovation and Development Project of China(2019);State Grid Corporation of China Co.,Ltd.technology project(No.5700-202019187A-0-0-00).
Delegation mechanism in Internet of Things(IoT)allows users to share some of their permissions with others.Cloud-based delegation solutions require that only the user who has registered in the cloud can be delegated p...
关键词:IoT access control permission delegation delegation trajectory capability revocation capability modification 
Hierarchical group signature with verifier-local revocation revisited被引量:1
《Science China(Information Sciences)》2022年第8期278-280,共3页Lin HOU Dongdai LIN Renzhang LIU 
supported by National Natural Science Foundation of China(Grant Nos.61872359,61936008).
Dear editor,Group signature(GS)[1]is a milestone in privacy-oriented cryptography,which provides authentication for messages and keeps signers anonymous.Trolin and Wikstr¨om[2]properly generalized GS into the notion ...
关键词:SIGNATURE PROPERLY notion 
检索报告 对象比较 聚类工具 使用帮助 返回顶部