[1] J. Hur and D.K. Noh, ”Attribute-Based Access Control
with Efficient Revocation in Data Out- sourcing
Systems”, IEEE Trans. Parallel and Distributed
Systems, vol. 22, no. 7, pp. 1214-1221, 2011.
[2] X. Liang, R. Lu, X. Lin, and X.S. Shen, ”Cipher- text
Policy Attribute Based Encryption with Ef- ficient
Revocation”, technical report, Univ. of Waterloo,
2010.
[3] M. Chase and S.S. Chow, ” Improving Pri- vacy
and Security in Multi-Authority Attribute- Based
Encryption”, Proc. 16th ACM Conf. Computer and
Comm. Security (CCS 09), pp 121-130 ,2009.
[4] J. Bethencourt, A. Sahai, and B. Waters,”
Ciphertext-Policy Attribute-Based Encryption ” Proc.
IEEE Symp. Security and Privacy (SP), pp. 321-334
,2007.
[5] S. Yu, C. Wang, K. Ren, and W. Lou, ”At- tribute
Based Data Sharing with Attribute Re- vocation”,
Proc. Fifth ACM Symp. Information, Computer and
Comm. Security (ASIACCS 10) 2010.
[6] L. Ibraimi, M. Petkovic, S. Nikova, P. Hartel, and
W. Jonker, ”Ciphertext-Policy Attribute- Based
Threshold Decryption with Flexible Del- egation and
Revocation of User Attributes”, IEEE Trans.Image
process,Jun, 2009.
[7] A. Boldyreva, V. Goyal, and V.
Kumar,”Identity-Based Encryption with Efficient Revocation”,
Proc. 15th ACM Conf. Computer and
Comm. Security (CCS), pp. 417-426, 2008.
[8] V. Goyal, O. Pandey, A. Sahai, and B. Wa- ters,
”Attribute-Based Encryption for Fine- Grained
Access Control of Encrypted Data”, Proc. 13th ACM
Conf. Computer and Comm. Security (CCS 06), pp.
89-98, 2006.
[9] Ming Li, Shucheng Yu,Yao Zheng, Kui Ren, and
Wenjing Lou, ”Scalable and Secure Sharing
of Personal Health Records in Cloud Computing
Using Attribute-Based Encryption”, Ieee transaction on
parallel and distributed sys- tems,vol.24,no.1,january
, 2013.
[10] G.Wang, Q. Liu, and J.Wu, ”Hierarchical
attribute-based encryption for fine-grained access
control in cloud storage services”, in Proc. ACM Conf.
Computer and Communications Security (ACM CCS),
Chicago, IL , 2010.
[11] Melissa Chase, ”Multi-authority Attribute Based
Encryption”, In TCC, volume 4392 of LNCS, pages
515534.
[12] Guojun Wang,, Qin Liu,, Jie Wub, Minyi Guo c
“Hierarchical attribute-based encryption and scalable
user revocation for sharing data in cloud servers”.