ATTRIBUTE-BASED

作品数:53被引量:286H指数:6
导出分析报告
相关领域:自动化与计算机技术更多>>
相关作者:杨洋王于丁凌晓徐聪杨家海更多>>
相关机构:清华大学重庆大学电子科技大学信阳师范学院更多>>
相关期刊:《The Journal of China Universities of Posts and Telecommunications》《High-Confidence Computing》《Journal of Information Security》《China Communications》更多>>
相关基金:国家自然科学基金中国博士后科学基金国家教育部博士点基金国家重点基础研究发展计划更多>>
-

检索结果分析

结果分析中...
条 记 录,以下是1-10
视图:
排序:
Adaptive Attribute-Based Honey Encryption: A Novel Solution for Cloud Data Security
《Computers, Materials & Continua》2025年第2期2637-2664,共28页Reshma Siyal Muhammad Asim Long Jun Mohammed Elaffendi Sundas Iftikhar Rana Alnashwan Samia Allaoua Chelloug 
funded by Princess Nourah bint Abdulrahman UniversityResearchers Supporting Project number (PNURSP2024R408), Princess Nourah bint AbdulrahmanUniversity, Riyadh, Saudi Arabia.
A basic procedure for transforming readable data into encoded forms is encryption, which ensures security when the right decryption keys are used. Hadoop is susceptible to possible cyber-attacks because it lacks built...
关键词:CYBERSECURITY data security cloud storage hadoop encryption and decryption privacy protection attribute-based honey encryption 
A review on the scale-up of high-shear wet granulation processes and the impact of process parameters
《Particuology》2024年第9期180-195,共16页Ana Rita Alves Marta Filipe Simões Sérgio Simões João Gomes 
Fundação para a Ciência e Tecnologia(FCT-MCTES);Portugal,under contract UIDB/00102/2020;Bluepharma,Coimbra,Portugal.The authors would like to acknowledge FCT for the financial support to João Gomes(CEECIND/01207/2018).
Wet granulation is one of the most important agglomeration processes,and high-shear granulation(HSG)one of the most employed technologies in the pharmaceutical industry.The most critical process parameters of HSG are ...
关键词:High-shear wetgranulation Parametric-based ATTRIBUTE-BASED Physics-based modelling Impeller design Scale-up 
Automatic Generation of Attribute-Based Access Control Policies from Natural Language Documents
《Computers, Materials & Continua》2024年第9期3881-3902,共22页Fangfang Shan Zhenyu Wang Mengyao Liu Menghan Zhang 
supported by the National Natural Science Foundation of China Project(No.62302540),please visit their website at https://www.nsfc.gov.cn/(accessed on 18 June 2024);The Open Foundation of Henan Key Laboratory of Cyberspace Situation Awareness(No.HNTS2022020),Further details can be found at http://xt.hnkjt.gov.cn/data/pingtai/(accessed on 18 June 2024);Natural Science Foundation of Henan Province Youth Science Fund Project(No.232300420422),you can visit https://kjt.henan.gov.cn/2022/09-02/2599082.html(accessed on 18 June 2024).
In response to the challenges of generating Attribute-Based Access Control(ABAC)policies,this paper proposes a deep learning-based method to automatically generate ABAC policies from natural language documents.This me...
关键词:Access control policy generation natural language deep learning 
BDAE: A Blockchain-Based and Decentralized Attribute-Based Encryption Scheme for Secure Data Sharing
《Wuhan University Journal of Natural Sciences》2024年第3期228-238,共11页YANG Shuangxi 
Ciphertext-policy attribute-based encryption(CP-ABE) is widely employed for secure data sharing and access control. However, its dependence on a single authority introduces security and performance challenges. Despite...
关键词:blockchain attribute-based encryption multi-authority verifiable secret sharing access control 
Offline/online attribute-based searchable encryption scheme from ideal lattices for IoT被引量:1
《Frontiers of Computer Science》2024年第3期239-241,共3页Yang YANG Guoyin ZHANG Sizhao LI Zechao LIU 
supported by the National Key R&D Program of China(No.2022YFB4400703);the Special Project for Industrial Foundation Reconstruction and High Quality Development of Manufacturing Industry(TC220A04X-1);the Basic Research Program(No.JCKY2020604C011).
1 Introduction The Internet of Things(IoT)has facilitated the development of numerous fields in our lives.However,some equipment in IoT environment lacks sufficient storage and data processing capabilities[1].A feasib...
关键词:IOT ENCRYPTION scheme 
Provably secure attribute-based authenticated encryption with keyword search from ideal lattices被引量:1
《Science China(Information Sciences)》2024年第1期304-305,共2页Lisha YAO Lin HOU Jian WENG Feixiang ZHAO 
supported by National Key Research and Development Plan of China(Grant No.2020YFB1005600);Major Program of Guangdong Basic and Applied Research Project(Grant No.2019B030302008);National Natural Science Foundation of China(Grant No.61825203);Guangdong Provincial Science and Technology Project(Grant Nos.2017B010111005,2021A0505030033);National Joint Engineering Research Center of Network Security Detection and Protection Technology;Guangdong Key Laboratory of Data Security and Privacy Preserving。
A public-key authenticated encryption with keyword search(PAEKS)[1,2]system overcomes the problem of an inside adversary forging searchable ciphertexts and guessing the keyword information from the given token.This sy...
关键词:authentic OVERCOME TOKEN 
Quantum-Resistant Multi-Feature Attribute-Based Proxy Re-Encryption Scheme for Cloud Services
《Computer Modeling in Engineering & Sciences》2024年第1期917-938,共22页Jinqiu Hou Changgen Peng Weijie Tan Hongfa Ding 
The project is provided funding by the Natural Science Foundation of China(Nos.62272124,2022YFB2701400);the Science and Technology Program of Guizhou Province(No.[2020]5017);the Research Project of Guizhou University for Talent Introduction(No.[2020]61);the Cultivation Project of Guizhou University(No.[2019]56);the Open Fund of Key Laboratory of Advanced Manufacturing Technology,Ministry of Education,GZUAMT2021KF[01];the Postgraduate Innovation Program in Guizhou Province(No.YJSKYJJ[2021]028).
Cloud-based services have powerful storage functions and can provide accurate computation.However,the question of how to guarantee cloud-based services access control and achieve data sharing security has always been ...
关键词:LATTICE learning with errors attribute-based proxy re-encryption linear secret sharing schemes 
Efficient Multi-Authority Attribute-Based Searchable Encryption Scheme with Blockchain Assistance for Cloud-Edge Coordination
《Computers, Materials & Continua》2023年第9期3325-3343,共19页Peng Liu Qian He Baokang Zhao Biao Guo Zhongyi Zhai 
supported by the National Natural Science Foundation of China(Nos.62162018,61972412);the Natural Science Foundation of Guangxi(No.2019GXNSFGA245004);the Guilin Science and Technology Project(20210226-1);the Innovation Project of Guangxi Graduate Education(No.YCSW2022296).
Cloud storage and edge computing are utilized to address the storage and computational challenges arising from the exponential data growth in IoT.However,data privacy is potentially risky when data is outsourced to cl...
关键词:Attribute-based encryption search encryption blockchain multi-authority cloud-edge 
Decentralizing access control system for data sharing in smart grid
《High-Confidence Computing》2023年第2期10-17,共8页Kunpeng Liu Chenfei Wang Xiaotong Zhou 
financially supported by the Science and Technology Project of State Grid Customer Service Center(research on access control and searchable encryption technology of attribute encryption for data value-added service)(SGKF0000DFQT2200030).
Smart grid enhances the intelligence of the traditional power grid,which allows sharing varied data such as consumer,production,or energy with service consumers.Due to the untrustworthy networks,there exist potential ...
关键词:Smart grid Access control Multiple-authority attribute-based ENCRYPTION 
Attribute-based keyword search encryption for power data protection被引量:1
《High-Confidence Computing》2023年第2期32-39,共8页Xun Zhang Dejun Mu Jinxiong Zhao 
supported in part by the National Science Foundation of China(62272389);the Shenzhen Fundamental Research Program(20210317191843003);Innovation Foundation for Doctor Dissertation of Northwestern Polytechnical University(CX2022065);Gansu Science and Technology Association Young Science and Technology Talents Lifting Project(GXH20220530-10).
To protect the privacy of power data,we usually encrypt data before outsourcing it to the cloud servers.However,it is challenging to search over the encrypted data.In addition,we need to ensure that only authorized us...
关键词:Attribute-based encryption Searchable encryption Keyword search Power grid data 
检索报告 对象比较 聚类工具 使用帮助 返回顶部