{"id":"https://openalex.org/W1993341076","doi":"https://doi.org/10.1109/tifs.2011.2172209","title":"HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing","display_name":"HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing","publication_year":2011,"publication_date":"2011-10-14","ids":{"openalex":"https://openalex.org/W1993341076","doi":"https://doi.org/10.1109/tifs.2011.2172209","mag":"1993341076"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2011.2172209","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2011.2172209","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5043935709","display_name":"Zhiguo Wan","orcid":"https://orcid.org/0000-0003-1319-1224"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zhiguo Wan","raw_affiliation_strings":["Key Laboratory for Information System Security, Ministry of Education, Tsinghua National Laboratory for Information Science and Technology, and School of Software, Tsinghua University, Beijing, China","Key Lab. for Inf. Syst. Security, Tsinghua Univ., Beijing, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory for Information System Security, Ministry of Education, Tsinghua National Laboratory for Information Science and Technology, and School of Software, Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]},{"raw_affiliation_string":"Key Lab. for Inf. Syst. Security, Tsinghua Univ., Beijing, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101785250","display_name":"Jun-e Liu","orcid":"https://orcid.org/0000-0003-1265-1970"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jun'e Liu","raw_affiliation_strings":["Key Laboratory for Information System Security, Ministry of Education, Tsinghua National Laboratory for Information Science and Technology, and School of Software, Tsinghua University, Beijing, China","Key Lab. for Inf. Syst. Security, Tsinghua Univ., Beijing, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory for Information System Security, Ministry of Education, Tsinghua National Laboratory for Information Science and Technology, and School of Software, Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]},{"raw_affiliation_string":"Key Lab. for Inf. Syst. Security, Tsinghua Univ., Beijing, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5001712801","display_name":"Robert H. Deng","orcid":"https://orcid.org/0000-0003-3491-8146"},"institutions":[{"id":"https://openalex.org/I79891267","display_name":"Singapore Management University","ror":"https://ror.org/050qmg959","country_code":"SG","type":"education","lineage":["https://openalex.org/I79891267"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Robert H. Deng","raw_affiliation_strings":["School of Information Systems, Singapore Management University, Singapore, Singapore","Sch. of Inf. Syst., Singapore Manage. Univ., Singapore, Singapore"],"affiliations":[{"raw_affiliation_string":"School of Information Systems, Singapore Management University, Singapore, Singapore","institution_ids":["https://openalex.org/I79891267"]},{"raw_affiliation_string":"Sch. of Inf. Syst., Singapore Manage. Univ., Singapore, Singapore","institution_ids":["https://openalex.org/I79891267"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5043935709"],"corresponding_institution_ids":["https://openalex.org/I99065089"],"apc_list":null,"apc_paid":null,"fwci":38.1505,"has_fulltext":false,"cited_by_count":530,"citation_normalized_percentile":{"value":0.9981046,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":100},"biblio":{"volume":"7","issue":"2","first_page":"743","last_page":"754"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9966999888420105,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9824000000953674,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8479582071304321},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.7983289957046509},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.7188770174980164},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7122305631637573},{"id":"https://openalex.org/keywords/attribute-based-encryption","display_name":"Attribute-based encryption","score":0.6864246726036072},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.647174596786499},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.6043263673782349},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.45934706926345825},{"id":"https://openalex.org/keywords/revocation","display_name":"Revocation","score":0.440753698348999},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3760411739349365},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.3443566560745239},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.19293656945228577},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.09638530015945435}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8479582071304321},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7983289957046509},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.7188770174980164},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7122305631637573},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.6864246726036072},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.647174596786499},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.6043263673782349},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.45934706926345825},{"id":"https://openalex.org/C2775892892","wikidata":"https://www.wikidata.org/wiki/Q6509517","display_name":"Revocation","level":3,"score":0.440753698348999},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3760411739349365},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.3443566560745239},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.19293656945228577},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.09638530015945435},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tifs.2011.2172209","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2011.2172209","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},{"id":"pmh:oai:ink.library.smu.edu.sg:sis_research-2383","is_oa":false,"landing_page_url":"https://ink.library.smu.edu.sg/cgi/viewcontent.cgi?article=2383&amp;amp;context=sis_research","pdf_url":null,"source":{"id":"https://openalex.org/S4377196871","display_name":"Institutional Knowledge (InK) - Institutional Knowledge at Singapore Management University (Singapore Management University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I79891267","host_organization_name":"Singapore Management University","host_organization_lineage":["https://openalex.org/I79891267"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"https://doi.org/10.1109/TIFS.2011.2172209","raw_type":"Journal Article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","score":0.550000011920929,"id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320320698","display_name":"National University of Singapore","ror":"https://ror.org/01tgyzw49"},{"id":"https://openalex.org/F4320322392","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W4285806","https://openalex.org/W123899820","https://openalex.org/W1498316612","https://openalex.org/W1506441556","https://openalex.org/W1977367431","https://openalex.org/W1991895580","https://openalex.org/W1998586673","https://openalex.org/W2023162038","https://openalex.org/W2040812000","https://openalex.org/W2069242349","https://openalex.org/W2104009445","https://openalex.org/W2105013814","https://openalex.org/W2108072891","https://openalex.org/W2116626915","https://openalex.org/W2134296086","https://openalex.org/W2138001464","https://openalex.org/W2144279894","https://openalex.org/W6600177081","https://openalex.org/W6605006938","https://openalex.org/W6629862473","https://openalex.org/W6651610227","https://openalex.org/W6675841666"],"related_works":["https://openalex.org/W2744624421","https://openalex.org/W4248847356","https://openalex.org/W777049646","https://openalex.org/W2131846073","https://openalex.org/W2174969786","https://openalex.org/W2620043489","https://openalex.org/W4292493860","https://openalex.org/W2767823571","https://openalex.org/W4235894667","https://openalex.org/W2984622284"],"abstract_inverted_index":{"Cloud":[0],"computing":[1,21,211],"has":[2],"emerged":[3],"as":[4],"one":[5],"of":[6,56,64,85,110,136,164,169],"the":[7,12,162,170],"most":[8,63],"influential":[9],"paradigms":[10],"in":[11,15,59,69,88,91,132,201,209],"IT":[13],"industry":[14],"recent":[16],"years.":[17],"Since":[18],"this":[19,92],"new":[20],"technology":[22],"requires":[23],"users":[24],"to":[25,30,77,120,149],"entrust":[26],"their":[27],"valuable":[28],"data":[29,58,87,208],"cloud":[31,60,89,210],"providers,":[32],"there":[33],"have":[34,50],"been":[35,51],"increasing":[36],"security":[37,163,168],"and":[38,81,128,181,185,192,199],"privacy":[39],"concerns":[40],"on":[41,167],"outsourced":[42,57,86,207],"data.":[43],"Several":[44],"schemes":[45],"employing":[46],"attribute-based":[47,172],"encryption":[48,98,104,173],"(ABE)":[49],"proposed":[52,113],"for":[53,145,206],"access":[54,72,83,130,146,204],"control":[55,73,84,131,205],"computing;":[61],"however,":[62],"them":[65],"suffer":[66],"from":[67],"inflexibility":[68],"implementing":[70],"complex":[71],"policies.":[74],"In":[75,138],"order":[76],"realize":[78],"scalable,":[79],"flexible,":[80],"fine-grained":[82,129],"computing,":[90],"paper,":[93],"we":[94],"propose":[95],"hierarchical":[96,108,122],"attribute-set-based":[97,103],"(HASBE)":[99],"by":[100,176],"extending":[101],"ciphertext-policy":[102,171],"(ASBE)":[105],"with":[106,151,203,212],"a":[107],"structure":[109],"users.":[111],"The":[112],"scheme":[114,175,191],"not":[115],"only":[116],"achieves":[117],"scalability":[118],"due":[119],"its":[121,183],"structure,":[123],"but":[124],"also":[125],"inherits":[126],"flexibility":[127],"supporting":[133],"compound":[134],"attributes":[135],"ASBE.":[137],"addition,":[139],"HASBE":[140,165],"employs":[141],"multiple":[142],"value":[143],"assignments":[144],"expiration":[147],"time":[148],"deal":[150],"user":[152],"revocation":[153],"more":[154],"efficiently":[155],"than":[156],"existing":[157],"schemes.":[158],"We":[159,188],"formally":[160],"prove":[161],"based":[166],"(CP-ABE)":[174],"Bethencourt":[177],"<etal":[178],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[179],"xmlns:xlink=\"http://www.w3.org/1999/xlink\"/>":[180],"analyze":[182],"performance":[184],"computational":[186],"complexity.":[187],"implement":[189],"our":[190],"show":[193],"that":[194],"it":[195],"is":[196],"both":[197],"efficient":[198],"flexible":[200],"dealing":[202],"comprehensive":[213],"experiments.":[214]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":10},{"year":2024,"cited_by_count":18},{"year":2023,"cited_by_count":22},{"year":2022,"cited_by_count":28},{"year":2021,"cited_by_count":43},{"year":2020,"cited_by_count":50},{"year":2019,"cited_by_count":46},{"year":2018,"cited_by_count":51},{"year":2017,"cited_by_count":58},{"year":2016,"cited_by_count":65},{"year":2015,"cited_by_count":49},{"year":2014,"cited_by_count":55},{"year":2013,"cited_by_count":29},{"year":2012,"cited_by_count":3}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
