期刊文献+

基于查询属性基加密的访问控制方案 被引量:3

Searchable Attribute-based Encryption Access Control Scheme
下载PDF
导出
摘要 针对医学影像数据云平台环境下数据安全和隐私保护问题,提出了基于CP-ABE的查询属性基加密访问控制方案.查询属性基加密融合了属性基加密方法和可搜索加密方法,使本文方案在有效阻止非授权访问的同时,提供密文查询功能,并且关键字密文可被多个用户共享检索. To solve security and privacy problems of medical imaging cloud platform, this paper putsforward the access control mechanism with attribute-based searchable encryption based on ciphertext-policy attribute-based encryption(CP-ABE). The attribute-based searchable encryption is a combinationof attribute-based encryption and searchable encryption, which effectively prevents unauthorized accessand provides cryptograph query function,and the keyword cipher can be searched by multiple users.
作者 叶少珍 陈丽卿 YE Shaozhen;CHEN Liqing(College of Mathematics and Computer Science, Fuzhou University, Fuzhou 350108, China;Fujian Key Laboratory of Medical Instrumentation & Pharmaceutical Technology, Fuzhou 350002, China)
出处 《北京工业大学学报》 CAS CSCD 北大核心 2016年第8期1160-1166,共7页 Journal of Beijing University of Technology
基金 国家自然科学基金资助项目(61201397)
关键词 查询属性基加密 访问控制 医学影像数据 attribute-based searchable encryption access control digital imaging and communication on
  • 相关文献

参考文献2

二级参考文献16

  • 1Tolone W, Ahn G J, Pai T. Access system [J]. Journal of ACM Computing Surveys, 2005, 37(1): 29-41.
  • 2Barker S, Sergot M J, Wijesekera D. Status-based access control [J]. ACM Transactions on Information and System Security, 2008, 12(1): 1-47.
  • 3Han W, Xu M, Zhao W, et al. A trusted decentralized access control framework for the client/server architecture [J]. Journal of Network and Computer Applications, 2010, 33(2): 76-83.
  • 4Li Ninghui, Wang Qihua. Resiliency policies in access control[C]//Proceedings of the 13th ACM Conference on Computer and Communications Security. New York: ACM Press, 2009: 113- 123.
  • 5Abassi R, El F S G. Towards a generic trust management model[C]//2012 19th International Conference on Telecommunications. Piscataway: IEEE Press, 2012: 1-6.
  • 6Ma Shunan, He Jingsha, Gao Feng. An access control model based on multi-factors trust [J]. Journal of Networks, 2012, 7(1): 173-178.
  • 7Wang Xiao. A study of P2P access control strategy based on trust and security grade[C]//2011 International Conference on Computer Science and Service System. Washington D C: IEEE Computer Society, 2011: 126-128.
  • 8Feng Xiaosheng, Ge Bin, Sun Yang, et al. Enhancing role management in role-based access control[C]//2010 3rd IEEE International Conference on Broadband Network and Multimedia Technology. Washington D C: IEEE Computer Society, 2010: 677-683.
  • 9Kabir M, Wang Hua, Bertino E. A role-involved purpose-based access control model [J]. Information Systems Frontiers, 2012, 14(3): 809-822.
  • 10王国庆,王刚,吕民,高国安.基于网格的跨企业协同制造平台研究[J].哈尔滨工业大学学报,2007,39(11):1723-1726. 被引量:5

共引文献5

同被引文献31

引证文献3

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部