Sign Up to like & get
recommendations!
0
Published in 2017 at "International Journal of Information Security"
DOI: 10.1007/s10207-017-0388-7
Abstract: Attribute-based encryption (ABE) allows one-to-many encryption with static access control. In many occasions, the access control policy must be updated, but the original encryptor might be unavailable to re-encrypt the message, which makes it impractical.…
read more here.
Keywords:
policy;
access policy;
attribute based;
access ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Transactions on Services Computing"
DOI: 10.1109/tsc.2021.3096177
Abstract: Ciphertext-Policy Attribute-Based Encryption (CP-ABE) is one of the potent encryption paradigms in protecting data confidentiality in the cloud data sharing scenario. However, the access policy of the traditional CP-ABE is in plaintext form that reveals…
read more here.
Keywords:
policy updating;
cloud data;
policy;
abe ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2021 at "IEEE Transactions on Services Computing"
DOI: 10.1109/tsc.2021.3096420
Abstract: Attribute based signature (ABS) is a novel cryptographic primitive, which permits users to sign a message over attributes without revealing other information. A signature only reveals that it is signed by a signer whose some…
read more here.
Keywords:
policy;
access policy;
verification;
attribute based ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2019 at "PLoS Biology"
DOI: 10.1371/journal.pbio.3000352
Abstract: The United States National Institutes of Health (NIH) imposed a public access policy on all publications for which the research was supported by their grants; the policy was drafted in 2004 and took effect in…
read more here.
Keywords:
policy;
access policy;
nih public;
biomedical journals ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2021 at "Future Internet"
DOI: 10.3390/fi13110279
Abstract: Managing and controlling access to the tremendous data in Cloud storage is very challenging. Due to various entities engaged in the Cloud environment, there is a high possibility of data tampering. Cloud encryption is being…
read more here.
Keywords:
storage;
cloud data;
encryption;
access policy ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2017 at "PeerJ"
DOI: 10.7717/peerj.3853
Abstract: Background The Gordon and Betty Moore Foundation (GBMF) was interested in understanding the potential effects of requiring that grantees publish their peer-reviewed research in open access journals. Methods We collected data on more than 2,000…
read more here.
Keywords:
access policy;
open access;
foundation;
estimated effects ... See more keywords