{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,6]],"date-time":"2026-02-06T02:55:57Z","timestamp":1770346557089,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,6,11]],"date-time":"2021-06-11T00:00:00Z","timestamp":1623369600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Science Foundation of Fujian Provincial Science and Technology Agency","award":["2020J02016"],"award-info":[{"award-number":["2020J02016"]}]},{"name":"the young talent promotion project of Fujian Science and Technology Association"},{"name":"Natural Science Foundation of China","award":["61872089;61972094;62032005"],"award-info":[{"award-number":["61872089;61972094;62032005"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,6,11]]},"DOI":"10.1145\/3450569.3463561","type":"proceedings-article","created":{"date-parts":[[2021,6,12]],"date-time":"2021-06-12T04:06:33Z","timestamp":1623470793000},"page":"143-154","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":35,"title":["Expressive Bilateral Access Control for Internet-of-Things in Cloud-Fog Computing"],"prefix":"10.1145","author":[{"given":"Shengmin","family":"Xu","sequence":"first","affiliation":[{"name":"Fujian Normal University, Fuzhou, China"}]},{"given":"Jianting","family":"Ning","sequence":"additional","affiliation":[{"name":"Fujian Normal University, Fuzhou, China"}]},{"given":"Jinhua","family":"Ma","sequence":"additional","affiliation":[{"name":"Fujian Normal University, Fuzhou, China"}]},{"given":"Xinyi","family":"Huang","sequence":"additional","affiliation":[{"name":"Fujian Normal University, Fuzhou, China"}]},{"given":"Hwee Hwa","family":"Pang","sequence":"additional","affiliation":[{"name":"Singapore Management University, Singapore, Singapore"}]},{"given":"Robert H.","family":"Deng","sequence":"additional","affiliation":[{"name":"Singapore Management University, Singapore, Singapore"}]}],"member":"320","published-online":{"date-parts":[[2021,6,11]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"FAME: Fast Attribute-based Message Encryption. In CCS. 665--682.","author":"Agrawal Shashank","year":"2017","unstructured":"Shashank Agrawal and Melissa Chase. 2017. FAME: Fast Attribute-based Message Encryption. In CCS. 665--682."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2444095"},{"key":"e_1_3_2_1_3_1","volume-title":"David Nu n ez, and Daniele Venturi","author":"Ateniese Giuseppe","year":"2019","unstructured":"Giuseppe Ateniese, Danilo Francati, David Nu n ez, and Daniele Venturi. 2019. Match Me if You Can: Matchmaking Encryption and Its Applications. In CRYPTO. 701--731."},{"key":"e_1_3_2_1_4_1","first-page":"168","article-title":"Dual-Policy Attribute Based Encryption","volume":"5536","author":"Attrapadung Nuttapong","year":"2009","unstructured":"Nuttapong Attrapadung and Hideki Imai. 2009. Dual-Policy Attribute Based Encryption. In ACNS, Vol. 5536. 168--185.","journal-title":"ACNS"},{"key":"e_1_3_2_1_5_1","volume-title":"Ciphertext-Policy Attribute-Based Encryption","author":"Bethencourt John","unstructured":"John Bethencourt, Amit Sahai, and Brent Waters. 2007. Ciphertext-Policy Attribute-Based Encryption. In IEEE S&P. 321--334."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Chiara Bodei Pierpaolo Degano Flemming Nielson and Hanne Riis Nielson. 1999. Static Analysis of Processes for No and Read-Up nad No Write-Down. In FoSSaCS. 120--134.","DOI":"10.1007\/3-540-49019-1_9"},{"key":"e_1_3_2_1_7_1","volume-title":"Franklin","author":"Boneh Dan","year":"2001","unstructured":"Dan Boneh and Matthew K. Franklin. 2001. Identity-Based Encryption from the Weil Pairing. In CRYPTO. 213--229."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"Flavio Bonomi Rodolfo A. Milito Jiang Zhu and Sateesh Addepalli. 2012. Fog computing and its role in the internet of things. In MCC. 13--16.","DOI":"10.1145\/2342509.2342513"},{"key":"e_1_3_2_1_9_1","first-page":"718","article-title":"Leakage-Abuse Attacks Against Searchable Encryption","volume":"2016","author":"Cash David","year":"2016","unstructured":"David Cash, Paul Grubbs, Jason Perry, and Thomas Ristenpart. 2016a. Leakage-Abuse Attacks Against Searchable Encryption. IACR Cryptology ePrint Archive, Vol. 2016 (2016), 718.","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_1_10_1","first-page":"718","article-title":"Leakage-Abuse Attacks Against Searchable Encryption","volume":"2016","author":"Cash David","year":"2016","unstructured":"David Cash, Paul Grubbs, Jason Perry, and Thomas Ristenpart. 2016b. Leakage-Abuse Attacks Against Searchable Encryption. IACR Cryptology ePrint Archive, Vol. 2016 (2016), 718.","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Ivan Damg\u00e5rd Helene Haagh and Claudio Orlandi. 2016. Access Control Encryption: Enforcing Information Flow with Cryptography. In TCC. 547--576.","DOI":"10.1007\/978-3-662-53644-5_21"},{"key":"e_1_3_2_1_12_1","unstructured":"eugdpr.org. 2016. General Data Protection Regulation. https:\/\/eugdpr.org\/the-process\/how-did-we-get-here"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Taher El Gamal. 1984. A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. In CRYPTO. 10--18.","DOI":"10.1007\/3-540-39568-7_2"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2677046.2677052"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"Vipul Goyal Omkant Pandey Amit Sahai and Brent Waters. 2006. Attribute-based encryption for fine-grained access control of encrypted data. In CCS. 89--98.","DOI":"10.1145\/1180405.1180418"},{"key":"e_1_3_2_1_16_1","unstructured":"Matthew Green Susan Hohenberger and Brent Waters. 2011. Outsourcing the Decryption of ABE Ciphertexts. In USENIX ."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2271848"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2983625"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCE.2017.2684981"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2762345"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2866321"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2410137"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"Yannis Rouselakis and Brent Waters. 2013. Practical constructions and new proof methods for large universe attribute-based encryption. In CCS. 463--474.","DOI":"10.1145\/2508859.2516672"},{"key":"e_1_3_2_1_24_1","first-page":"457","article-title":"Fuzzy Identity-Based Encryption","volume":"3494","author":"Sahai Amit","year":"2005","unstructured":"Amit Sahai and Brent Waters. 2005. Fuzzy Identity-Based Encryption. In EUROCRYPT, Vol. 3494. 457--473.","journal-title":"EUROCRYPT"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2016.2579198"},{"key":"e_1_3_2_1_26_1","unstructured":"Jordan Shropshire. 2014. Extending the Cloud with Fog: Security Challenges & Opportunities. In AMCIS ."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.15439\/2014F503"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2172209"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2019.2936481"},{"key":"e_1_3_2_1_30_1","volume-title":"Match in my way: Fine-grained bilateral access control for secure cloud-fog computing","author":"Xu Shengmin","year":"2020","unstructured":"Shengmin Xu, Jianting Ning, Yingjiu Li, Yinghui Zhang, Guowen Xu, Xinyi Huang, and Robert Deng. 2020. Match in my way: Fine-grained bilateral access control for secure cloud-fog computing. IEEE Transactions on Dependable and Secure Computing (2020)."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.11.031"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2016.04.015"},{"key":"e_1_3_2_1_33_1","unstructured":"Yupeng Zhang Jonathan Katz and Charalampos Papamanthou. 2016. All Your Queries Are Belong to Us: The Power of File-Injection Attacks on Searchable Encryption. In USENIX. 707--720."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2825289"},{"key":"e_1_3_2_1_35_1","volume-title":"VABKS: Verifiable attribute-based keyword search over outsourced encrypted data. In INFOCOM. 522--530.","author":"Zheng Qingji","year":"2014","unstructured":"Qingji Zheng, Shouhuai Xu, and Giuseppe Ateniese. 2014. VABKS: Verifiable attribute-based keyword search over outsourced encrypted data. In INFOCOM. 522--530."}],"event":{"name":"SACMAT '21: The 26th ACM Symposium on Access Control Models and Technologies","location":"Virtual Event Spain","acronym":"SACMAT '21","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 26th ACM Symposium on Access Control Models and Technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3450569.3463561","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3450569.3463561","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:47:50Z","timestamp":1750193270000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3450569.3463561"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,11]]},"references-count":35,"alternative-id":["10.1145\/3450569.3463561","10.1145\/3450569"],"URL":"https:\/\/doi.org\/10.1145\/3450569.3463561","relation":{},"subject":[],"published":{"date-parts":[[2021,6,11]]},"assertion":[{"value":"2021-06-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}