[1] |
Deng R, Lu R, Lai C, et al. Towards power consumption- delay tradeoff by workload allocation in cloud-fog computing[C]∥Proc of the IEEE International Conference on Communications,2015:3909-3914.
|
[2] |
Bonomi F,Milito R,Zhu J,et al.Fog computing and its role in the Internet of Things[C]∥Proc of the 1st Edition of the MCC Workshop on Mobile Cloud Computing,2012:13-16.
|
[3] |
Aleisa M A,Abuhussein A,Sheldon F T.Access control in fog computing:Challenges and research agenda[J].IEEE Access,2020,8:83986-83999.
|
[4] |
Li X,Niu J,Kumari S,et al.A robust biometrics based three-factor authentication scheme for global mobility networks in smart city[J].Future Generation Compter Systems,2018,83:607-618.
|
[5] |
Ghosh B,Parimi P,Rout R R.Improved attribute-based encryption scheme in fog computing environment for healthcare systems[C]∥Proc of the 11th International Conference on Computing Communication and Networking Technologies,2020:1-6.
|
[6] |
Niu Shu-fen, Chen Li-xia,Li Wen-ting,et al.Blockchain-based electronic medical record data sharing scheme[J].Acta Automatica Sinica,2022,48(8):2028-2038.(in Chinese)
|
[7] |
Sahai A,Waters B.Fuzzy identity-based encryption[C]∥Proc of International Conference on Theory & Applications of Cryptographic Techniques,2005:457-473.
|
[8] |
Goyal V,Pandey O,Sahai A,et al.Attribute-based encryption for fine-grained access control of encrypted data[C]∥Proc of the 13th ACM Conference on Computer and Communications Security,2006:89-98.
|
[9] |
Bethencourt J, Sahai A, Waters B. Ciphertext-policy attribute- based encryption:An expressive, efficient, and provably secure realization[C]∥Proc of 2007 IEEE Symposium on Security and Privacy,2007:321-334.
|
[10] |
Luo Wang-ping, Feng Chao-sheng, Zou Li-ping, et al. Attribute-based encryption scheme with fast encryption[J].Journal of Software,2020,31(12):3923-3936.(in Chinese)
|
[11] |
Xu Sheng-wei, Wang Fei-jie.A traceable and concealable attribute-based encryption scheme under multi-institution authorization[J].Information Network Security,2020,20(1):33-39.(in Chinese)
|
[12] |
Meng F, Cheng L, Wang M.Ciphertext-policy attribute-based encryption with hidden sensitive policy from keyword search techniques in smart city[J].EURASIP Journal on Wireless Communications and Networking,2021,2021:Article number 20.
|
[13] |
Zhao J,Zeng P,Choo K-K R.An efficient access control scheme with outsourcing and attribute revocation for fog- enabled e-health[J]. IEEE Access,2021,9:13789-13799.
|
[14] |
Zhang P,Chen Z H,Liang K T,et al.A cloud-based access control scheme with user revocation and attribute update[C]∥Proc of Australasian Conference on Information Secu- rity Privacy,2016:525-540.
|
[15] |
Li J,Yao W,Han J,et al.User collusion avoidance CP-ABE with efficient attribute revocation for cloud storage[J].IEEE Systems Journal, 2018,12(2):1767-1777.
|
[16] |
Zhang P,Chen Z H,Liu J K,et al.An efficient access control scheme with outsourcing capability and attribute update for fog computing[J].Future Generation Computer Systems,2018,78(2):753-762.
|
[17] |
Mori T,Nguyen T V,Mori Y,et al.Preservation of Lyapunov functions under bilinear mapping[J].Automatica,2006,42(6):1055-1058.
|
[18] |
Libert B, Quisquater J J.The exact security of an identity based signature and its applications.[EB/OL].[2021-06-15]. https://www.docin.com/p-1459189976.htm.
|
|
附中文参考文献:
|
[6] |
牛淑芬,陈俐霞,李文婷,等.基于区块链的电子病历数据共享方案[J].自动化学报,2022,48(8):2028-2038.
|
[10] |
罗王平,冯朝胜,邹莉萍,等.一种支持快速加密的基于属性加密方案[J].软件学报,2020,31(12):3923-3936.
|
[11] |
许盛伟,王飞杰.多机构授权下可追踪可隐藏的属性基加密方案[J].信息网络安全,2020,20(1):33-39.
|