The following publications are possibly variants of this publication:
- A restricted proxy re-encryption with keyword search for fine-grained data access control in cloud storageZhenhua Chen, Shundong Li, Qiong Huang, Yilei Wang, Sufang Zhou. concurrency, 28(10):2858-2876, 2016. [doi]
- An efficient signcryption for data access control in cloud computingFagen Li, Bo Liu, Jiaojiao Hong. computing, 99(5):465-479, 2017. [doi]
- Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud ComputingShucheng Yu, Cong Wang, Kui Ren, Wenjing Lou. infocom 2010: 534-542 [doi]
- Securing Personal Health Records in Cloud Computing: Patient-Centric and Fine-Grained Data Access Control in Multi-owner SettingsMing Li, Shucheng Yu, Kui Ren, Wenjing Lou. securecomm 2010: 89-106 [doi]
- Fine-Grained Data Access Control Systems with User Accountability in Cloud ComputingJin Li, Gansen Zhao, Xiaofeng Chen, Dongqing Xie, Chunming Rong, Wenjun Li, Lianzhang Tang, Yong Tang. cloudcom (empty year): 89-96 [doi]
- Anonymous attribute-based proxy re-encryption for access control in cloud computingYinghui Zhang, Jin Li 0002, Xiaofeng Chen 0001, Hui Li. scn, 9(14):2397-2411, 2016. [doi]