EconBiz - Find Economic Literature
    • Logout
    • Change account settings
  • A-Z
  • Beta
  • About EconBiz
  • News
  • Thesaurus (STW)
  • Academic Skills
  • Help
  •  My account 
    • Logout
    • Change account settings
  • Login
EconBiz - Find Economic Literature
Publications Events
Search options
Advanced Search history
My EconBiz
Favorites Loans Reservations Fines
    You are here:
  • Home
  • Search: subject:"Attribute-based encryption"
Narrow search

Narrow search

Year of publication
Subject
All
Data security 5 Datensicherheit 5 Data protection 4 Datenschutz 4 Cloud Computing 3 Cloud computing 2 Internet der Dinge 2 Internet of things 2 Access Control 1 Access control 1 Algorithm 1 Algorithmus 1 Attribute-Based Encryption 1 Attribute-Based Messaging 1 Attribute-based Encryption 1 Attribute-based encryption 1 Authentication 1 Betriebliche Dokumentation 1 Blockchain 1 CP-ABE 1 CR-ABE 1 Chameleon Hash (CH) algorithm 1 Computer Engineering 1 Computer Science 1 Computer network 1 Computernetz 1 Corporate documentation 1 Credibility 1 Data privacy 1 E-Health 1 E-commerce 1 E-health 1 Electronic Commerce 1 Electronic medical records 1 Electronics and Electrical 1 Engineering 1 Glaubwürdigkeit 1 Internet of Things (IoT) 1 IoT 1 Lagermanagement 1
more ... less ...
Online availability
All
Undetermined 4 Free 2 CC license 1
Type of publication
All
Article 6 Book / Working Paper 1
Type of publication (narrower categories)
All
Article in journal 5 Aufsatz in Zeitschrift 5 Thesis 1
Language
All
English 6 Undetermined 1
Author
All
Abbasi, Hasan 1 Abrishami, Saied 1 Al-Turjman, Fadi 1 Bobba, Rakesh B. 1 Gligor, Virgil D. 1 Guo, Y. Jay 1 Jiang, Liu 1 Kumar, Kukatlapalli Pradeep 1 Kumar, R. Lakshmana 1 Liu, Ren Ping 1 Moradbeikie, Azin 1 Murthy, Hari 1 Murugesan, Arun 1 Nargunam, A. Shajin 1 Ni, Wei 1 Pillai, Vinay Jha 1 Pramila, R. Suji 1 Prathap, Boppuru Rudra 1 Saminathan, Balamurali 1 Thiruthuvanathan, Michael Moses 1 Wang, Xu 1 Yu, Guangsheng 1 Yu, Kan 1 Yu, Ping 1 Zha, Xuan 1 Zhang, J. Andrew 1 Zhou, Zhenliu 1 Zhu, Shidong 1
more ... less ...
Published in...
All
Data science and management : DSM 1 IEEE transactions on engineering management : EM 1 International Journal of Information Security and Privacy (IJISP) 1 International journal of electronic business : IJEB 1 International journal of enterprise network management 1 International journal of information technology and management : IJITM 1
Source
All
ECONIS (ZBW) 5 BASE 1 Other ZBW resources 1
Showing 1 - 7 of 7
Cover Image
Secure approach to sharing digitized medical data in a cloud environment
Kumar, Kukatlapalli Pradeep; Prathap, Boppuru Rudra; … - In: Data science and management : DSM 7 (2024) 2, pp. 108-118
Without proper security mechanisms, medical records stored electronically can be accessed more easily than physical files. Patient health information is scattered throughout the hospital environment, including laboratories, pharmacies, and daily medical status reports. The electronic format of...
Persistent link: https://www.econbiz.de/10015063140
Saved in:
Cover Image
A lightweight authentication and secure data access between fog and IoT user
Murugesan, Arun; Saminathan, Balamurali; Al-Turjman, Fadi; … - In: International journal of electronic business : IJEB 16 (2021) 1, pp. 77-87
Persistent link: https://www.econbiz.de/10012508945
Saved in:
Cover Image
Enabling attribute revocation for fine-grained access control in blockchain-IoT systems
Yu, Guangsheng; Zha, Xuan; Wang, Xu; Ni, Wei; Yu, Kan; … - In: IEEE transactions on engineering management : EM 67 (2020) 4, pp. 1213-1230
Persistent link: https://www.econbiz.de/10012387941
Saved in:
Cover Image
Research on key techniques of cryptographic access control and properties optimisation in cloud storage
Zhu, Shidong; Jiang, Liu; Zhou, Zhenliu - In: International journal of information technology and … 17 (2018) 4, pp. 257-274
Persistent link: https://www.econbiz.de/10011989744
Saved in:
Cover Image
Creating Time-Limited Attributes for Time-Limited Services in Cloud Computing
Moradbeikie, Azin; Abrishami, Saied; Abbasi, Hasan - In: International Journal of Information Security and … 10 (2016) 4, pp. 44-57
Nowadays, Cloud Computing is considered one of the important fields in both research and industry. Users enjoy membership of cloud providing effective services called time-limited services. This paper addresses time-limited services offering an attribute-based access control method and...
Persistent link: https://www.econbiz.de/10012045683
Saved in:
Cover Image
Enhancing security in real time patient monitoring
Pramila, R. Suji; Nargunam, A. Shajin - In: International journal of enterprise network management 7 (2016) 3, pp. 223-236
Persistent link: https://www.econbiz.de/10011648858
Saved in:
Cover Image
SECURE, POLICY-BASED, MULTI-RECIPIENT DATA SHARING
Bobba, Rakesh B. - 2009
properties.In the first part of this dissertation, we focus on CiphertextPolicy Attribute-Based Encryption (CP-ABE) schemes that …
Persistent link: https://www.econbiz.de/10009450965
Saved in:
A service of the
zbw
  • Sitemap
  • Plain language
  • Accessibility
  • Contact us
  • Imprint
  • Privacy

Loading...