2018
DOI: 10.1016/j.jnca.2018.08.008
|View full text |Cite
|
Sign up to set email alerts
|

Revocable attribute-based access control in mutli-autority systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 16 publications
(7 citation statements)
references
References 18 publications
0
7
0
Order By: Relevance
“…In [15,16], a user and attribute revocable access control scheme is proposed.The scheme supports the revocation of the user or the user's attributes, and the terminal members cannot access the original resources after revocation. At the same time, in the scheme, users can add or reduce attributes according to their own needs, and the amount of calculation is small in this process.…”
Section: Related Workmentioning
confidence: 99%
“…In [15,16], a user and attribute revocable access control scheme is proposed.The scheme supports the revocation of the user or the user's attributes, and the terminal members cannot access the original resources after revocation. At the same time, in the scheme, users can add or reduce attributes according to their own needs, and the amount of calculation is small in this process.…”
Section: Related Workmentioning
confidence: 99%
“…But this scheme does not support attribute revocation. Imine et al [29] divided the access system into the public domain and the private domain, and introduced complementary sharing to realize attribute revocation in the public domain and user revocation in the private domain. But in this scheme, two ciphertext algorithms need to be constructed to deal with different revocation situations.…”
Section: ) User Revocationmentioning
confidence: 99%
“…However, in the time-based methodologies, the withdrawal is not instantly and the retracted users can still get into the data up to the next key generation phase, while proxy-key frameworks donot get to a fine-grained access and the users are not allowed to gain into their data if the proxy is not online. However, in 2018, Imine et al [Imine, Lounis and Bouabdallh (2018)] proposed a new and proficient withdrawal framework for dispersed attribute-based systems in order to solve these restrictions. Their proposed framework certifies changeable and fine-grained Access Control and averts security degradations.…”
Section: Security and Privacy Challenges In Access Control Big Datamentioning
confidence: 99%
“…Yet, this framework has some problems in the AC withdrawal, which is one of its main downsides. In 2018, Imine et al [Imine, Lounis and Bouabdallh (2018)] proposed a new methodology which implements revocation for disperse attribute-scheme for multi-authority systems, such as cloud-based systems in which DB are stored. Specifically, this scheme brings the following advantages: a) Rekeying is not needed because of the secret sharing of the revocation's allocation.…”
Section: Framework For Access Control Big Datamentioning
confidence: 99%
See 1 more Smart Citation