Attribute-Based Access Control with Efficient Revocation in Data Outsourcing Systems
Citations
1,057 citations
Cites background from "Attribute-Based Access Control with..."
...Recently, [23] and [24] proposed two CP-ABE schemes with immediate attribute revocation capability, instead of periodical revocation....
[...]
291 citations
257 citations
246 citations
Cites background from "Attribute-Based Access Control with..."
...In order to solve the problem, some ABE schemes [16], [17], [18], [19], [20], [21], [22], [23], [24], [25], [26], [27] have been proposed to outsource the...
[...]
243 citations
References
4,364 citations
"Attribute-Based Access Control with..." refers background in this paper
...1, the architecture of the data outsourcing system consists of the following entities: 1....
[...]
...Ç...
[...]
...ABE comes in two flavors called key-policy ABE (KP-ABE) and ciphertext-policy ABE....
[...]
4,257 citations
"Attribute-Based Access Control with..." refers background in this paper
...1, the architecture of the data outsourcing system consists of the following entities: 1....
[...]
...Ç...
[...]
3,610 citations
3,128 citations
1,277 citations