参考文献
[1]Sweeney L.K-anonymity:A Model for Protecting Pri-vacy[J].International Journal of Uncertainty,Fuzziness and Knowledge-based Systems,2002,10(5):557-570.
[2]Samarati P.Protecting Respondents Identities in Microdata Release[J].IEEE Transactions on Knowledge and Data Engineering,2001,13(6):1010-1027.
[3]Um J H,Kim Y K,Lee H J,et al.K-nearest Neighbor Query Processing Algorithm for Cloaking Regions Towards User Privacy Protection in Location-based Services[J].Journal of Systems Architecture,2012,58(9):354-371.
[4]Liu Xinxin,Liu Kaikai,Guo Linke,et al.A Game-theoretic Approach for Achieving K-anonymity in Location Based Services[C]//Proceedings of IEEE INFOCOM’13.Washington D.C.,USA:IEEE Press,2013:2985-2993.
[5]Lu Rongxing,Lin Xiaodong,Shi Zhiguo,et al.PLAM:A Privacy-preserving Framework for Local-area Mobile Social Networks[C]//Proceedings of IEEE INFOCOM’14.Washington D.C.,USA:IEEE Press,2014:763-771.
[6]Lan T.Secure Mechanism Based on Concurrent Signature for Mobile Payment Services[C]//Proceedings of the 3rd IEEE International Conference on Communication Software and Networks.Washington D.C.,USA:IEEE Press,2011:435-438.
[7]Bethencourt J,Sahai A,Waters B.Ciphertext-policy Attribute-based Encryption[C]//Proceedings of EEE Symposium on Security and Privacy.Washington D.C.,USA:IEEE Press,2007:321-334.
[8]Goyal V,Pandey O,Sahai A,et al.Attribute-based Encryption for Fine-grained Access Control of Encrypted Data[C]//Proceedings of the 13th ACM Conference on Computer and Communications Security.New York,USA:ACM Press,2006:89-98.
[9]Cheung L,Newport C.Provably Secure Ciphertext Policy ABE[C]//Proceedings of ACM Conference on Computer and Communications Security.New York,USA:ACM Press,2007:456-465.
[10]孙国梓,董宇.基于 CP-ABE 算法的云存储数据访问控制[J].通信学报,2011,32(7):835-152.
(下转第116页)
(上接第111页)
[11]Guo Linke,Zhu Xiaoyan,Zhang Chi,et al.Privacy-preserving Attribute-based Friend Search in Geosocial Networks with Untrusted Servers[C]//Proceedings of GLOBECOM’13.Washington D.C.,USA:IEEE Press,2013:629-634.
[12]Guo Linke,Zhang Chi,Sun Jinyuan,et al.PAAS:A Privacy-preserving Attribute-based Authentication System for eHealth Networks[C]//Proceedings of the 32nd IEEE International Conference on Distributed Computing Systems.Washington
D.C.,USA:IEEE Press,2012:224-233.
[13]Sun Wenhai,Yu Shucheng,Lou Wenjing,et al.Protecting Your Right:Attribute-based Keyword Search with Fine-grained Owner-enforced Search Authorization in the Cloud[C]//Proceedings of IEEE INFOCOM’14.Washington D.C.,USA:IEEE
Press,2014:226-234.
[14]吕志泉,洪澄,张敏,等.面向社交网络的隐私保护方案[J].通信学报,2014,35(8):23-32.
[15]Boneh D,Franklin M.Identity-based Encryption from the Weil Pairing[C]//Proceedings of CRYPTO’01.Berlin,Germany:Springer-Verlag,2001:213-229.
编辑刘冰 |