参考文献
[1]Birkel H, Muller J M. Potentials of industry 4.0 for supply chain management within the triple bottom line of sustainability—A systematic literature review[J]. Journal of Cleaner Production, 2021, 289: 114[2]陈晓东, 刘洋, 周柯. 数字经济提升我国产业链韧性的路径研究[J]. 经济体制改革, 2022, 1: 95102[3]俞林, 赵俊红, 霍伟东. 推进数据要素市场化配置 促进经济高质量发展[J]. 宏观经济管理, 2021, 10: 4854[4]Qiu J, Tian Z, Du C, et al. A survey on access control in the age of Internet of things[J]. IEEE Internet of Things Journal, 2020, 7(6): 46824696[5]Sahai A, Waters B. Fuzzy identitybased encryption[C] Proc of the 24th Annual Int Conf on the Theory and Applications of Cryptographic Techniques. Berlin: Springer, 2005: 457473[6]Goyal V, Pandey O, Sahai A, et al. Attributebased encryption for finegrained access control of encrypted data[C] Proc of the 13th ACM Conf on Computer and Communications Security. New York: ACM, 2006: 8998[7]Bethencourt J, Sahai A, Waters B. Ciphertextpolicy attributebased encryption[C] Proc of the 28th Symp on Security and Privacy. Piscataway, NJ: IEEE, 2007: 321334[8]Chase M. Multiauthority attributebased encryption[C] Proc of the 4th Theory of Cryptography Conf. Berlin: Springer, 2007: 515534[9]Gao S, Piao G, Zhu J, et al. Trustaccess: A trustworthy secure ciphertextpolicy and attribute hiding access control scheme based on blockchain[J]. IEEE Trans on Vehicular Technology, 2020, 69(6): 57845798[10]杜瑞忠, 张添赫, 石朋亮. 基于区块链且支持数据共享的密文策略隐藏访问控制方案[J]. 通信学报, 2022, 43(6): 168178[11]Chase M, Chow S S M. Improving privacy and security in multiauthority attributebased encryption[C] Proc of the 16th ACM Conf on Computer and Communications Security. New York: ACM, 2009: 121130[12]Zhang Y, Deng R H, Xu S, et al. Attributebased encryption for cloud computing access control: A survey[J]. ACM Computing Surveys, 2020, 53(4): 141[13]Lewko A, Waters B. Decentralizing attributebased encryption[C] Proc of the 30th Annual Int Conf on the Theory and Applications of Cryptographic Techniques. Berlin: Springer, 2011: 568588[14]Guo H, Meamari E, Shen C C. Multiauthority attributebased access control with smart contract[C] Proc of the 2019 Int Conf on Blockchain Technology. New York: ACM, 2019: 611[15]Qin X, Huang Y, Yang Z, et al. A blockchainbased access control scheme with multiple attribute authorities for secure cloud data sharing[J]. Journal of Systems Architecture, 2021, 112: 111[16]Xiao M, Huang Q, Miao Y, et al. Blockchainbased multiauthority finegrained access control system with flexible revocation[J]. IEEE Trans on Services Computing, 2021, 5(6): 31433155
|