Controlling Access to Data

作者: Shawe-Taylor John Stewart , Chandrasekaran Guru Paran

DOI:

关键词:

摘要: A data encryption and decryption system is provided. An electronic apparatus (3) configured to extract a feature set from plaintext using lossy algorithm, encrypt the set, send it server (7), receive an access control list (ACL), this key (6), back (9), which used data. identifier also exchanged. (4) identify entity (2) decrypt encrypted The (6) stores ACL in mutual association. When receives (4), checks on associated with identifier, returns key.

参考文章(4)
Bodo Moller, Andrei Kulik, Umesh Shankar, Sarvar Patel, Storing encrypted objects ,(2011)
Ahmet Talha Ozcan, Can Gemicioglu, Kaan Onarlioglu, Michael Weissbacher, Collin Mulliner, William Robertson, Engin Kirda, BabelCrypt: The Universal Encryption Layer for Mobile Messaging Applications financial cryptography. pp. 355- 369 ,(2015) , 10.1007/978-3-662-47854-7_21
Jinghua Jiang, Xiaolin Gui, Zhenkui Shi, Xingliang Yuan, Cong Wang, Towards secure and practical targeted mobile advertising mobile ad hoc and sensor networks. pp. 79- 88 ,(2015) , 10.1109/MSN.2015.17