{"id":"https://openalex.org/W2980080395","doi":"https://doi.org/10.2298/csis180912027t","title":"Hierarchical authority based weighted attribute encryption scheme","display_name":"Hierarchical authority based weighted attribute encryption scheme","publication_year":2019,"publication_date":"2019-01-01","ids":{"openalex":"https://openalex.org/W2980080395","doi":"https://doi.org/10.2298/csis180912027t","mag":"2980080395"},"language":"en","primary_location":{"id":"doi:10.2298/csis180912027t","is_oa":true,"landing_page_url":"https://doi.org/10.2298/csis180912027t","pdf_url":"http://www.doiserbia.nb.rs/ft.aspx?id=1820-02141900027T","source":{"id":"https://openalex.org/S206939107","display_name":"Computer Science and Information Systems","issn_l":"1820-0214","issn":["1820-0214","2406-1018"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310321031","host_organization_name":"ComSIS Consortium","host_organization_lineage":["https://openalex.org/P4310321031"],"host_organization_lineage_names":["ComSIS Consortium"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computer Science and Information Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"http://www.doiserbia.nb.rs/ft.aspx?id=1820-02141900027T","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5080029818","display_name":"Qiuting Tian","orcid":null},"institutions":[{"id":"https://openalex.org/I96733725","display_name":"Shanghai Maritime University","ror":"https://ror.org/04z7qrj66","country_code":"CN","type":"education","lineage":["https://openalex.org/I96733725"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qiuting Tian","raw_affiliation_strings":["College of Information Engineering, Shanghai Maritime University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"College of Information Engineering, Shanghai Maritime University, Shanghai, China","institution_ids":["https://openalex.org/I96733725"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101744803","display_name":"Dezhi Han","orcid":"https://orcid.org/0000-0001-8861-5461"},"institutions":[{"id":"https://openalex.org/I96733725","display_name":"Shanghai Maritime University","ror":"https://ror.org/04z7qrj66","country_code":"CN","type":"education","lineage":["https://openalex.org/I96733725"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Dezhi Han","raw_affiliation_strings":["College of Information Engineering, Shanghai Maritime University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"College of Information Engineering, Shanghai Maritime University, Shanghai, China","institution_ids":["https://openalex.org/I96733725"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5082685261","display_name":"Yanmei Jiang","orcid":"https://orcid.org/0009-0006-1213-8404"},"institutions":[{"id":"https://openalex.org/I96733725","display_name":"Shanghai Maritime University","ror":"https://ror.org/04z7qrj66","country_code":"CN","type":"education","lineage":["https://openalex.org/I96733725"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yanmei Jiang","raw_affiliation_strings":["College of Information Engineering, Shanghai Maritime University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"College of Information Engineering, Shanghai Maritime University, Shanghai, China","institution_ids":["https://openalex.org/I96733725"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5101744803"],"corresponding_institution_ids":["https://openalex.org/I96733725"],"apc_list":null,"apc_paid":null,"fwci":0.4335,"has_fulltext":true,"cited_by_count":5,"citation_normalized_percentile":{"value":0.72574428,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":"16","issue":"3","first_page":"797","last_page":"813"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9912999868392944,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9912999868392944,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9710000157356262,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9391000270843506,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8529759049415588},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.711956262588501},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.7029047608375549},{"id":"https://openalex.org/keywords/collusion","display_name":"Collusion","score":0.6836905479431152},{"id":"https://openalex.org/keywords/cloud-storage","display_name":"Cloud storage","score":0.6558984518051147},{"id":"https://openalex.org/keywords/attribute-based-encryption","display_name":"Attribute-based encryption","score":0.6236491203308105},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5730821490287781},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.5680133700370789},{"id":"https://openalex.org/keywords/authorization","display_name":"Authorization","score":0.5028809905052185},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.4345402717590332},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.32914865016937256},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3246009945869446},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.17780053615570068},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.07555538415908813},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.06323647499084473}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8529759049415588},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.711956262588501},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.7029047608375549},{"id":"https://openalex.org/C2781198186","wikidata":"https://www.wikidata.org/wiki/Q701521","display_name":"Collusion","level":2,"score":0.6836905479431152},{"id":"https://openalex.org/C2777059624","wikidata":"https://www.wikidata.org/wiki/Q914359","display_name":"Cloud storage","level":3,"score":0.6558984518051147},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.6236491203308105},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5730821490287781},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.5680133700370789},{"id":"https://openalex.org/C108759981","wikidata":"https://www.wikidata.org/wiki/Q788590","display_name":"Authorization","level":2,"score":0.5028809905052185},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.4345402717590332},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.32914865016937256},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3246009945869446},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.17780053615570068},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.07555538415908813},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.06323647499084473},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C175444787","wikidata":"https://www.wikidata.org/wiki/Q39072","display_name":"Microeconomics","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.2298/csis180912027t","is_oa":true,"landing_page_url":"https://doi.org/10.2298/csis180912027t","pdf_url":"http://www.doiserbia.nb.rs/ft.aspx?id=1820-02141900027T","source":{"id":"https://openalex.org/S206939107","display_name":"Computer Science and Information Systems","issn_l":"1820-0214","issn":["1820-0214","2406-1018"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310321031","host_organization_name":"ComSIS Consortium","host_organization_lineage":["https://openalex.org/P4310321031"],"host_organization_lineage_names":["ComSIS Consortium"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computer Science and Information Systems","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.2298/csis180912027t","is_oa":true,"landing_page_url":"https://doi.org/10.2298/csis180912027t","pdf_url":"http://www.doiserbia.nb.rs/ft.aspx?id=1820-02141900027T","source":{"id":"https://openalex.org/S206939107","display_name":"Computer Science and Information Systems","issn_l":"1820-0214","issn":["1820-0214","2406-1018"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310321031","host_organization_name":"ComSIS Consortium","host_organization_lineage":["https://openalex.org/P4310321031"],"host_organization_lineage_names":["ComSIS Consortium"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computer Science and Information Systems","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1745623571","display_name":null,"funder_award_id":"61873160","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2087396116","display_name":null,"funder_award_id":"China","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3317480652","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3445439380","display_name":null,"funder_award_id":"61672338","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5994120800","display_name":null,"funder_award_id":"Natural","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8863666567","display_name":null,"funder_award_id":"and No.","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2980080395.pdf","grobid_xml":"https://content.openalex.org/works/W2980080395.grobid-xml"},"referenced_works_count":26,"referenced_works":["https://openalex.org/W125869453","https://openalex.org/W1498316612","https://openalex.org/W1763482972","https://openalex.org/W1969480396","https://openalex.org/W1976420017","https://openalex.org/W1978945852","https://openalex.org/W1993341076","https://openalex.org/W1998586673","https://openalex.org/W2021961454","https://openalex.org/W2101709669","https://openalex.org/W2147096936","https://openalex.org/W2150386397","https://openalex.org/W2152924492","https://openalex.org/W2318321907","https://openalex.org/W2344005651","https://openalex.org/W2368943972","https://openalex.org/W2461251588","https://openalex.org/W2470298330","https://openalex.org/W2528277418","https://openalex.org/W2551680302","https://openalex.org/W2621131080","https://openalex.org/W2774394508","https://openalex.org/W2949476230","https://openalex.org/W2961087419","https://openalex.org/W4200307116","https://openalex.org/W4242618840"],"related_works":["https://openalex.org/W2123296434","https://openalex.org/W2555738791","https://openalex.org/W4298042445","https://openalex.org/W2104547074","https://openalex.org/W2132693790","https://openalex.org/W1593822213","https://openalex.org/W2367441718","https://openalex.org/W2017675414","https://openalex.org/W2017616439","https://openalex.org/W4390045902"],"abstract_inverted_index":{"With":[0],"the":[1,16,29,50,55,60,73,76,79,89,109,121],"development":[2],"of":[3,31,52,78,81,111],"cloud":[4,90,145],"storage":[5,8,91,146],"technology,":[6],"data":[7],"security":[9,110],"has":[10],"become":[11],"increasingly":[12],"serious.":[13],"Aiming":[14],"at":[15],"problem":[17],"that":[18,59,120],"existing":[19],"attribute-based":[20],"encryption":[21,39,56,105],"schemes":[22],"do":[23],"not":[24],"consider":[25],"hierarchical":[26,34,47,64],"authorities":[27,48,61],"and":[28,49,66,93,116,125,127,137],"weight":[30,51,82],"attribute.":[32],"A":[33],"authority":[35],"based":[36],"weighted":[37],"attribute":[38,53],"scheme":[40,44,85,101,122],"is":[41,123,141],"proposed.":[42],"This":[43],"will":[45],"introduce":[46],"into":[54],"scheme,":[57],"so":[58],"have":[62,69],"a":[63],"relationship":[65],"different":[67,70],"attributes":[68],"importance.":[71],"At":[72],"same":[74],"time,":[75],"introduction":[77],"concept":[80],"makes":[83],"this":[84,100],"more":[86,142],"flexible":[87],"in":[88],"environment":[92],"enables":[94],"fine-grained":[95],"access":[96],"control.":[97],"In":[98],"addition,":[99],"implements":[102],"an":[103],"online/offline":[104],"mechanism":[106],"to":[107],"improve":[108],"stored":[112],"data.":[113],"Security":[114],"proof":[115],"performance":[117],"analysis":[118],"show":[119],"safe":[124],"effective,":[126],"it":[128],"can":[129],"resist":[130],"collusion":[131],"attacks":[132],"by":[133],"many":[134],"malicious":[135],"users":[136],"authorization":[138],"centers.":[139],"It":[140],"suitable":[143],"for":[144],"environments":[147],"than":[148],"other":[149],"schemes.":[150]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":3}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
