{"id":"https://openalex.org/W2008663867","doi":"https://doi.org/10.1145/2484402.2484411","title":"How to use attribute-based encryption to implement role-based access control in the cloud","display_name":"How to use attribute-based encryption to implement role-based access control in the cloud","publication_year":2013,"publication_date":"2013-05-08","ids":{"openalex":"https://openalex.org/W2008663867","doi":"https://doi.org/10.1145/2484402.2484411","mag":"2008663867"},"language":"en","primary_location":{"id":"doi:10.1145/2484402.2484411","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2484402.2484411","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2013 international workshop on Security in cloud computing","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5039641353","display_name":"Yan Zhu","orcid":"https://orcid.org/0000-0002-9159-745X"},"institutions":[{"id":"https://openalex.org/I92403157","display_name":"University of Science and Technology Beijing","ror":"https://ror.org/02egmk993","country_code":"CN","type":"education","lineage":["https://openalex.org/I92403157"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yan Zhu","raw_affiliation_strings":["University of Science and Technology Beijing, beijing, China"],"affiliations":[{"raw_affiliation_string":"University of Science and Technology Beijing, beijing, China","institution_ids":["https://openalex.org/I92403157"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5090159880","display_name":"Di Ma","orcid":"https://orcid.org/0000-0001-7330-4716"},"institutions":[{"id":"https://openalex.org/I4210130704","display_name":"University of Michigan\u2013Dearborn","ror":"https://ror.org/035wtm547","country_code":"US","type":"education","lineage":["https://openalex.org/I4210130704"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Di Ma","raw_affiliation_strings":["University of Michigan-Dearborn, Dearborn, USA","University of Michigan - Dearborn, Dearborn, USA"],"affiliations":[{"raw_affiliation_string":"University of Michigan-Dearborn, Dearborn, USA","institution_ids":["https://openalex.org/I4210130704"]},{"raw_affiliation_string":"University of Michigan - Dearborn, Dearborn, USA","institution_ids":["https://openalex.org/I4210130704"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5105987928","display_name":"Changjun Hu","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Chang-Jun Hu","raw_affiliation_strings":["huchangjun@ies.ustb.edu.cn, beijing, China"],"affiliations":[{"raw_affiliation_string":"huchangjun@ies.ustb.edu.cn, beijing, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5003921452","display_name":"Dijiang Huang","orcid":"https://orcid.org/0000-0003-3257-6349"},"institutions":[{"id":"https://openalex.org/I55732556","display_name":"Arizona State University","ror":"https://ror.org/03efmqc40","country_code":"US","type":"education","lineage":["https://openalex.org/I55732556"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Dijiang Huang","raw_affiliation_strings":["Arizona State University, Tempe, USA"],"affiliations":[{"raw_affiliation_string":"Arizona State University, Tempe, USA","institution_ids":["https://openalex.org/I55732556"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5039641353"],"corresponding_institution_ids":["https://openalex.org/I92403157"],"apc_list":null,"apc_paid":null,"fwci":4.3281,"has_fulltext":false,"cited_by_count":24,"citation_normalized_percentile":{"value":0.94125779,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"33","last_page":"40"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.9872000217437744,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/attribute-based-encryption","display_name":"Attribute-based encryption","score":0.7642101049423218},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.733188271522522},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7269455194473267},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7241135835647583},{"id":"https://openalex.org/keywords/role-based-access-control","display_name":"Role-based access control","score":0.7221651077270508},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.5815216898918152},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.46426013112068176},{"id":"https://openalex.org/keywords/bilinear-interpolation","display_name":"Bilinear interpolation","score":0.45019108057022095},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.38892126083374023},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.33374279737472534},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.14833104610443115},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.08612051606178284}],"concepts":[{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.7642101049423218},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.733188271522522},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7269455194473267},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7241135835647583},{"id":"https://openalex.org/C45567728","wikidata":"https://www.wikidata.org/wiki/Q1702839","display_name":"Role-based access control","level":3,"score":0.7221651077270508},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.5815216898918152},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.46426013112068176},{"id":"https://openalex.org/C205203396","wikidata":"https://www.wikidata.org/wiki/Q612143","display_name":"Bilinear interpolation","level":2,"score":0.45019108057022095},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.38892126083374023},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.33374279737472534},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.14833104610443115},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.08612051606178284},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2484402.2484411","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2484402.2484411","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2013 international workshop on Security in cloud computing","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.47999998927116394,"display_name":"Partnerships for the goals","id":"https://metadata.un.org/sdg/17"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W123899820","https://openalex.org/W177444027","https://openalex.org/W1510795740","https://openalex.org/W1547131737","https://openalex.org/W1682451491","https://openalex.org/W1798609567","https://openalex.org/W1964472986","https://openalex.org/W1976420017","https://openalex.org/W1990220158","https://openalex.org/W1998586673","https://openalex.org/W2008663867","https://openalex.org/W2020753934","https://openalex.org/W2021328268","https://openalex.org/W2076046175","https://openalex.org/W2108072891","https://openalex.org/W2116556172","https://openalex.org/W2116626915","https://openalex.org/W2121699410","https://openalex.org/W2124228505","https://openalex.org/W2138001464","https://openalex.org/W2152924492","https://openalex.org/W2166602595","https://openalex.org/W4300915622"],"related_works":["https://openalex.org/W2372156812","https://openalex.org/W2374393728","https://openalex.org/W2386545329","https://openalex.org/W2148952798","https://openalex.org/W2382286253","https://openalex.org/W2945232779","https://openalex.org/W2356011375","https://openalex.org/W1795360416","https://openalex.org/W2392979115","https://openalex.org/W819284483"],"abstract_inverted_index":{"This":[0],"paper":[1],"addresses":[2],"how":[3],"to":[4,27,39,85,153],"construct":[5],"a":[6,17,41,51,69,93,108,127,146],"RBAC-compatible":[7],"attribute-based":[8],"encryption":[9],"(ABE)":[10],"for":[11,158],"secure":[12],"cloud":[13],"storage,":[14],"which":[15,132],"provides":[16,81,145],"user-friendly":[18],"and":[19,116,140],"easy-to-manage":[20],"security":[21],"mechanism":[22],"without":[23],"user":[24,52],"intervention.":[25],"Similar":[26],"role":[28],"hierarchy":[29],"in":[30],"RBAC,":[31],"attribute":[32,56,90,97],"lattice":[33],"introduced":[34],"into":[35],"ABE":[36,71,159],"is":[37],"used":[38],"define":[40],"seniority":[42],"relation":[43],"among":[44],"all":[45],"values":[46,57,91],"of":[47,60,103,111,138,150],"an":[48,82],"attribute,":[49],"whereby":[50],"holding":[53],"the":[54,136],"senior":[55],"acquires":[58],"permissions":[59],"their":[61],"juniors.":[62],"Based":[63],"on":[64,92,114],"these":[65],"notations,":[66],"we":[67,106],"present":[68],"new":[70],"scheme":[72,125],"called":[73],"Attribute-Based":[74],"Encryption":[75],"with":[76,121],"Attribute":[77],"Lattice":[78],"(ABE-AL)":[79],"that":[80],"efficient":[83],"approach":[84],"implement":[86],"comparison":[87],"operations":[88],"between":[89],"poset":[94],"derived":[95],"from":[96],"lattice.":[98],"By":[99],"using":[100],"bilinear":[101],"groups":[102],"composite":[104],"order,":[105],"propose":[107],"practical":[109],"construction":[110],"ABE-AL":[112],"based":[113],"forward":[115],"backward":[117],"derivation":[118],"functions.":[119],"Compared":[120],"prior":[122],"solutions,":[123],"our":[124,143],"offers":[126],"compact":[128],"policy":[129],"representation":[130],"solution,":[131],"can":[133],"significantly":[134],"reduce":[135],"size":[137],"privatekeys":[139],"ciphertexts.":[141],"Furthermore,":[142],"solution":[144],"richer":[147],"expressive":[148],"power":[149],"access":[151,156],"policies":[152],"facilitate":[154],"flexible":[155],"control":[157],"scheme.":[160]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":4},{"year":2016,"cited_by_count":2},{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":3},{"year":2013,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
