Achieving Secure Role-Based Access Control on Encrypted Data in Cloud Storage
Citations
298 citations
Cites methods from "Achieving Secure Role-Based Access ..."
...Several cryptographybased solutions, such as attribute-based encryption [60] and role-based encryption [61] methods, can be used to achieve flexible and fine-grained access control....
[...]
...[61] firstly proposed a Role-Based Encryption (RBE) scheme with efficient user revocation that combines the cryptographic techniques with RBAC policies, which allow executing the RBAC policies in the encrypted data....
[...]
203 citations
Cites background from "Achieving Secure Role-Based Access ..."
...Cryptography is an important technology enabling to protect information against the third parity such as the malicious users and adversaries, and recently a public-key cryptography is in widespread use to cloud systems [7], [8]....
[...]
181 citations
155 citations
142 citations
References
9,282 citations
"Achieving Secure Role-Based Access ..." refers background in this paper
...Digital Object Identifier 10.1109/TIFS.2013.2286456 their data, and security is often cited as the top obstacle for cloud adoption....
[...]
6,902 citations
4,680 citations
4,257 citations
3,610 citations