The following publications are possibly variants of this publication:
- Verified CSAC-Based CP-ABE Access Control of Cloud Storage in SWIMZhijun Wu 0001, Jia Nie, Yue Yin, Hui Wang. euc 2021: 72-78 [doi]
- A CP-ABE Access Control Scheme Based on Proxy Re-encryption in Cloud StorageHaiyong Wang, Yao Peng. icccsec 2018: 413-425 [doi]
- Keys Distributing Optimization of CP-ABE Based Access Control in Cryptographic Cloud StorageYong Cheng, Jiang-chun Ren, Zhiying Wang, Songzhu Mei, Jie Zhou. ieicet, 95-D(12):3088-3091, 2012. [doi]
- An efficient access control scheme based on CP-ABE with supporting attribute change in cloud storage systemsTao Ye, Yongquan Cai, Xu Zhao, Yongli Yang, Wei Wang, Yi Zhu. ijwmc, 16(1):41-49, 2019. [doi]
- Hierarchical attribute-based encryption for fine-grained access control in cloud storage servicesGuojun Wang, Qin Liu, Jie Wu. ccs 2010: 735-737 [doi]
- A Role and Context Based Access Control Model with UMLYubin Bao, Jie Song, Daling Wang, Derong Shen, Ge Yu;. Young Computer Scientists, 2008. ICYCS 2008. The 9th International Conference for, , Oct 2008. [doi]
- A Role and Context Based Access Control Model with UMLYubin Bao, Jie Song, Daling Wang, Derong Shen, Ge Yu;. Young Computer Scientists, 2008. ICYCS 2008. The 9th International Conference for, , Oct 2008. [doi]
- Policy Storage for Role-Based Access Control SystemsAndrĂ¡s Belokosztolszki, David M. Eyers, Wei Wang, Ken Moody. wetice 2003: 196-201 [doi]