1. Meserole J S, Moore J W. What is system wide information management (SWIM)?IEEE Aerospace and Electronic Systems Magazine, 2007, 22(5): 13-19
2. Stephens B. System-wide information management (SWIM) demonstration security architecture. Proceedings of the IEEE/AIAA 25th Digital Avionics Systems Conference, Oct 15-19, 2006, Portland, OR, USA. Piscataway, NJ, USA: IEEE, 2006: 12p
3. Wu Y D, Wei Z, Deng R H. Attribute-based access to scalable media in cloud-assisted content sharing networks. IEEE Transactions on Multimedia, 2013, 15(4): 778-788
4. Su J S, Cao D, Wang X F, et al. Attribute based encryption schemes. Journal of Software, 2011, 22(6): 1299-1315 (in Chinese)
5. Boldyreva A, Goyal V, Kumar V. Identity-based encryption with efficient revocation. Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS '08 ), Oct 27-31, 2008, Alexandria, VA, USA. New York, NY, USA: ACM, 2008: 417-426
6. Hur J, Noh D K. Attribute-based access control with efficient revocation in data outsourcing systems. IEEE Transactions on Parallel and Distributed Systems, 2011, 22(7): 1214-1221
7. Xie X X, Ma H, Li J, et al. An efficient ciphertext-policy attribute-based access control towards revocation in cloud computing. Journal of Universal Computer Science, 2013, 19(16): 2349-2367
8. Yu S C, Wang C, Ren K, et al. Attribute based data sharing with attribute revocation. Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security (ASIACCS’10 ), Apr 13-16, 2010, Beijing, China. New York, NY, USA: ACM, 2010: 261-270
9. Hur J. Attribute-based secure data sharing with hidden policies in smart grid. IEEE Transactions on Parallel and Distributed Systems, 2013, 24(11): 2171-2180
10. Wang P P, Feng D G, Zhang L W. CP-ABE scheme supporting fully fine-grained attribute revocation. Journal of Software, 2012, 23(10): 2805-2816 (in Chinese)
11. Ma H, Bai C C, Li B, et al. Attribute-based encryption scheme supporting attribute revocation and decryption outsourcing. Journal of Xidian University, 2015, 42(6): 6-10 (in Chinese)
12. Guo L F, Lu B. Eiffcient proxy re-encryption with keyword search scheme. Journal of Computer Research and Development, 2014, 51(6): 1221-1228 (in Chinese)
13. Wang J X, Zhang M, Chen Q. An efficient attribute based encryption with attribute revocation. Journal of Computer Applications, 2012, 32(S1): 39-43 (in Chinese)